SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Phreaker
Exit interview
Brute Force
Accreditation
2. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Coax
Inference
Identification
Owner
3. Someone who hacks
DMZ
Hacker
PAP (Password Authentication Protocol)
Promiscuous mode
4. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
Active attacks
Tort
TCB
5. A network entity that provides a single entrance / exit point to the Internet.
SQL (Structured Query Language)
Entrapment
Bastion hosts
DCOM
6. Motive - Opportunity - and Means. These deal with crime.
Fiber optic
MOM
Script kiddies
War driving
7. The person that determines the permissions to files. The data owner.
Clipper Chip
Entrapment
Owner
Dogs
8. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Authorization creep
CHAP
Non-repudiation
Clipper Chip
9. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
ActiveX Object Linking and Embedding
Telnet
Closed network
MOM
10. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Guards
PKI
VLANs
Inference
11. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
SSO (Single sign-on)
Enticement
Firmware
Rolling hot sites
12. A military standard defining controls for emanation protection
PAP (Password Authentication Protocol)
Active attacks
Authentication
TEMPEST
13. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Block cipher
DNS cache poisoning
Diffie-Hellman
Passive attacks
14. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Digital signing
AES (Advanced Encryption Standard)
Malware
Expert systems
15. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Privacy Act of 1974
Software
Buffer overflow
Quantitative
16. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Cryptanalysis
SESAME
Hash
SSL/TLS
17. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Classes of IP networks
ActiveX Object Linking and Embedding
Motion detector
Teardrop
18. The process of reducing your risks to an acceptable level based on your risk analysis
Replay
Risk Mitigation
Logic bomb
Substitution
19. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Content dependant
Smurf
CEO
Rijndael
20. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Illegal/Unethical
BIA
Custodian
Compiler
21. Must be in place for you to use a biometric system
Biometric profile
Block cipher
Digital certificates
Illegal/Unethical
22. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Authentication
Buffer overflow
Trap Door
Motion detector
23. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Callback Security/Call Forwarding
Multithreading
VPN (Virtual Private Network)
Accreditation
24. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Logic bomb
Multitasking
Firmware
VLANs
25. Disclosure - Alteration - Destruction. These things break the CIA triad
Risk Mitigation
Service packs
Worm
DAD
26. Entails planning and system actions to ensure that a project is following good quality management practices
Quality Assurance
Well-known ports
TCP Wrappers
Social engineering
27. Making individuals accountable for their actions on a system typically through the use of auditing
DDOS
Accountability
CEO
IRC
28. The frequency with which a threat is expected to occur.
Code of ethics
DOS
ARO (Annualized Rate of Occurrence)
Trojan horses
29. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
CIA
Object Oriented Programming
Aggregation
Service packs
30. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
ARP (Address Resolution Protocol)
Risk Analysis
Accreditation
Software development lifecycle
31. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Honey pot
Schema
Change management
Code of ethics
32. CISSPs subscribe to a code of ethics for building up the security profession
Custodian
NAT
Code of ethics
Passive attacks
33. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
Callback Security/Call Forwarding
CHAP
Polymorphism
Rolling hot sites
34. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Non-repudiation
/etc/passwd
Bastion hosts
Throughput of a Biometric System
35. Data storage formats and equipment that allow the stored data to be accessed in any order
PAP (Password Authentication Protocol)
Cold Site
Polymorphism
RAM (Random-access memory)
36. Transferring your risk to someone else - typically an insurance company
PKI
Probing
Risk Transferring
Risk Mitigation
37. Rolling command center with UPS - satellite - uplink - power - etc.
Teardrop
Rolling hot sites
Entrapment
WAP (Wireless Application Protocol)
38. Software designed to infiltrate or damage a computer system - without the owner's consent.
PKI
IAB
Malware
Well-known ports
39. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
ARP (Address Resolution Protocol)
Replay
Mandatory vacation
Separation of duties
40. Object Linking and Embedding. The ability of an object to be embedded into another object.
OLE
Boot-sector Virus
Risk Analysis
Penetration testing
41. A war dialing utility
Inference
Toneloc
TCP Wrappers
Software
42. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Illegal/Unethical
Authorization
Audit Trail
Halon
43. Motivational tools for employee awareness to get them to report security flaws in an organization
Twisted pair
Fraud
Qualitative
Incentive programs
44. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
MitM
Termination procedures
Centralized
Bugtraq
45. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Polymorphism
Stream cipher
ARO (Annualized Rate of Occurrence)
Trojan horses
46. Scanning the airwaves for radio transmissions
WTLS (Wireless Transport Layer Security)
Senior Management
Scanning
Malware
47. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
PAP (Password Authentication Protocol)
Caesar Cipher
Expert System
Noise & perturbation
48. When security is managed at a central point in an organization
Centralized
CD-Rom
War dialing
Finger scanning
49. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Format 7 times
Common criteria
Trade Secret
Passive attacks
50. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
UUEncode
Multithreading
Risk Acceptance
Patent