SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A mechanism by which connections to TCP services on a system are allowed or disallowed
Keystroke logging
Key Escrow
TCSEC
TCP Wrappers
2. A sandbox. Emulates an operating environment.
Hearsay Evidence
Kerberos
Buffer overflow
Virtual machine
3. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Masquerade
Degausser
Audit Trail
Scanning
4. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
DHCP
Joke
ISDN (Integrated Services Digital Network)
Fences
5. Someone whose hacking is primarily targeted at the phone systems
Phreaker
CHAP
War dialing
Security kernel
6. Using ICMP to diagram a network
Custodian
Fire extinguisher
Penetration testing
Probing
7. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Object Oriented Programming
Warm Site
Penetration testing
Masquerade
8. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Content dependant
ROT-13
Compiler
CORBA
9. An attempt to trick the system into believing that something false is real
Guards
FAR/FRR/CER
Username/password
Hoax
10. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Authentication
Data remanence
RAM (Random-access memory)
Authorization
11. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Trojan horses
Due Care
Worm
Qualitative
12. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Quality Assurance
Polymorphism
Penetration testing
Wiretapping
13. Access control method for database based on the content of the database to provide granular access
Trade Secret
Content dependant
Security Perimeter
/etc/passwd
14. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Call tree
Authorization creep
Security Perimeter
Script
15. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Brute force
CIO
Data Mart
Fraggle
16. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Salami Slicing
BIOS
Polymorphic
Fiber optic
17. An instance of a scripting language
Script
Classes of IP networks
Fraud
Cyphertext only
18. Reasonable doubt
Repeaters
Authorization creep
Termination procedures
Burden of Proof
19. A RFC standard. A mechanism for performing commands on a remote system
Risk Mitigation
Telnet
Active attacks
Clipper Chip
20. Closed Circuit Television
Security through obscurity
Boot-sector Virus
CCTV
BIA
21. These viruses usually infect both boot records and files.
Multipartite
MOM
Non-repudiation
RADIUS (Remote authentication dial-in user service)
22. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Object Oriented Programming
Debug
Aggregation
Active attacks
23. CISSPs subscribe to a code of ethics for building up the security profession
Virtual machine
Covert channels
Code of ethics
Owner
24. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
ARO (Annualized Rate of Occurrence)
Digital signing
Finger scanning
Hardware
25. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Patent
Routers
Custodian
Raid 0 - 1 - 3 - 5
26. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Joke
User
COM
Firewall types
27. Dynamic Host Configuration Protocol.
Rolling hot sites
RADIUS (Remote authentication dial-in user service)
DHCP
Trademark
28. Network devices that operate at layer 3. This device separates broadcast domains.
Routers
Job rotation
Privacy Act of 1974
Switches / Bridges
29. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Expert systems
Debug
Twisted pair
Script
30. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Copyright
CD-Rom
Sabotage
Malware
31. Common Object Request Broker Architecture.
CORBA
Software librarian
Coax
Polymorphism
32. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
SSL/TLS
DNS cache poisoning
AES (Advanced Encryption Standard)
RAM (Random-access memory)
33. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Mandatory vacation
Polymorphism
Symmetric
CGI (The Common Gateway Interface)
34. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Script kiddies
Fire extinguisher
Technical - Administrative - Physical
Mandatory vacation
35. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
MOM
Authorization creep
DDOS
Granularity
36. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Risk Acceptance
Due Diligence
ROT-13
Biometric profile
37. Once authenticated - the level of access you have to a system
Authorization
Non-repudiation
Worm
Security kernel
38. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Covert channels
ROT-13
Risk Analysis
Digital certificates
39. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Joke
Illegal/Unethical
Polymorphic
Biometrics
40. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
l0pht
Smurf
Trap Door
Expert systems
41. These can be used to verify that public keys belong to certain individuals.
Logic bomb
Digital certificates
Spoofing
Artificial Neural Networks (ANN)
42. Animals with teeth. Not as discriminate as guards
Centralized
Dogs
Security Perimeter
Risk Analysis
43. Entails planning and system actions to ensure that a project is following good quality management practices
Sabotage
Attenuation
Quality Assurance
Multitasking
44. Emanations from one wire coupling with another wire
CORBA
Crosstalk
Repeaters
PAP (Password Authentication Protocol)
45. Computer Incident Response Team
ISDN (Integrated Services Digital Network)
CIRT
Risk Transferring
Coax
46. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s
Java
Fraggle
Diffie-Hellman
Scanning
47. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
SQL (Structured Query Language)
Audit Trail
Reciprocal agreement
ISDN (Integrated Services Digital Network)
48. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
SLE (Single Loss Expectancy or Exposure)
Stream cipher
Wiretapping
CHAP
49. To not be legal (as far as law is concerned) or ethical
OLE
Polymorphism
Illegal/Unethical
Eavesdropping
50. The person that controls access to the data
Joke
Custodian
Hoax
Call tree
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests