SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technique to eliminate data redundancy.
Back door/ trap door/maintenance hook
Normalization
Keystroke logging
Incentive programs
2. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Fire extinguisher
Session Hijacking
Checksum
Data remanence
3. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Macro
Motion detector
DHCP
Passive attacks
4. Method of authenticating to a system. Something that you supply and something you know.
Dogs
Content dependant
Username/password
DMZ
5. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
DDOS
Tailgating / Piggybacking
Decentralized
Hash
6. Defines the objects and their attributes that exist in a database.
Clipper Chip
Block cipher
Schema
Privacy Act of 1974
7. Signal degradation as it moves farther from its source
Attenuation
Fraggle
Sniffing
Motion detector
8. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Digital signing
Granularity
FAR/FRR/CER
Trade Secret
9. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Biometrics
Risk Analysis
Object Oriented Programming
Bastion hosts
10. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Substitution
Fraggle
Entrapment
Two-Factor Authentication
11. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Illegal/Unethical
Hearsay Evidence
Mandatory vacation
DHCP
12. A network entity that provides a single entrance / exit point to the Internet.
Termination procedures
Transposition
Finger scanning
Bastion hosts
13. Ethernet - Cat5 - Twisted to allow for longer runs.
AES (Advanced Encryption Standard)
Masquerade
Checksum
Twisted pair
14. Personal - Network - and Application
BIA
Firewall types
Trap Door
Virtual Memory/Pagefile.sys
15. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Polymorphism
Entrapment
ActiveX Object Linking and Embedding
Fraggle
16. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
Carnivore
Change management
Spoofing
Biometric profile
17. The ability to have more than one thread associated with a process
Multithreading
User
Cyphertext only
SSL/TLS
18. Jumping into dumpsters to retrieve information about someone/something/a company
Motion detector
Granularity
DDOS
Dumpster diving
19. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Hackers
WTLS (Wireless Transport Layer Security)
Copyright
SYN Flood
20. When one key of a two-key pair has more encryption pattern than the other
Code of ethics
Symmetric
DAD
Asymmetric
21. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Fences
Tort
ISDN (Integrated Services Digital Network)
Format 7 times
22. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Granularity
Finger scanning
Tailgating / Piggybacking
ROM (Read-only memory)
23. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Termination procedures
Authentication
Finger printing
Cryptanalysis
24. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
CCTV
Due Care
Crosstalk
CRC (Cyclic Redundancy Check)
25. Computer Incident Response Team
Software development lifecycle
CIRT
Embezzlement
Risk Acceptance
26. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Bastion hosts
Java
Aggregation
Boot-sector Virus
27. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Hash
Authorization
Normalization
Job rotation
28. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Switches / Bridges
Tailgating / Piggybacking
Encryption
DCOM
29. The frequency with which a threat is expected to occur.
Enticement
IRC
ARO (Annualized Rate of Occurrence)
CEO
30. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Vulnerability analysis tools
War driving
Burden of Proof
Security kernel
31. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Back door/ trap door/maintenance hook
TACACS (Terminal access controller access control system)
Two-Factor Authentication
Phreaker
32. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Identification
MOM
/etc/passwd
Switches / Bridges
33. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Trade Secret
Active attacks
PKI
Change management
34. CISSPs subscribe to a code of ethics for building up the security profession
Brute Force
Software librarian
Transposition
Code of ethics
35. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Qualitative
Repeaters
TCSEC
Risk Acceptance
36. This is an open international standard for applications that use wireless communications.
Repeaters
Firewall types
WAP (Wireless Application Protocol)
Block cipher
37. A site that has some equipment in place - and can be up within days
/etc/passwd
SQL (Structured Query Language)
Packet Sniffing
Warm Site
38. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Trojan horses
War driving
Qualitative
Clipper Chip
39. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Virtual Memory/Pagefile.sys
Masquerade
RADIUS (Remote authentication dial-in user service)
Vulnerability analysis tools
40. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Multiprocessing
Active attacks
Fraud
Kerberos
41. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
Inference
Man trap
SLE (Single Loss Expectancy or Exposure)
Fiber optic
42. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Virtual Memory/Pagefile.sys
Throughput of a Biometric System
Teardrop
VPN (Virtual Private Network)
43. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Username/password
UUEncode
Base-64
Substitution
44. The practice of obtaining confidential information by manipulation of legitimate users.
ALE (Annualized Loss Expectancy)
Data remanence
OLE
Social engineering
45. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Audit Trail
WAP (Wireless Application Protocol)
DOS
Switches / Bridges
46. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Logic bomb
Trojan horses
Security Perimeter
Birthday attack
47. Same as a block cipher except that it is applied to a data stream one bit at a time
Rijndael
Replay
Stream cipher
Authorization
48. Internet Relay Chat.
Software development lifecycle
Joke
Hacker
IRC
49. Enticing people to hit your honeypot to see how they try to access your system.
Passive attacks
Malware
Enticement
OEP
50. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
CHAP
Multitasking
WTLS (Wireless Transport Layer Security)
Brute force
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests