SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
/etc/passwd
Throughput of a Biometric System
Illegal/Unethical
Accountability
2. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
FAR/FRR/CER
ALE (Annualized Loss Expectancy)
Transposition
Fraggle
3. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Transposition
Block cipher
Joke
Raid 0 - 1 - 3 - 5
4. A war dialing utility
Digest
DOS
Repeaters
Toneloc
5. Network device that operates at layer 1. Concentrator.
WAP (Wireless Application Protocol)
Risk Mitigation
Hubs
Brute force
6. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
Risk Acceptance
DDOS
Exit interview
Incentive programs
7. Scanning the airwaves for radio transmissions
Clipping levels
DCOM
Scanning
Birthday attack
8. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
Base-64
Fraggle
IRC
9. A system designed to stop piggybacking.
Asset Value
Man trap
Trap Door
Spoofing
10. Signal degradation as it moves farther from its source
COM
Trademark
Attenuation
Man trap
11. Relating to quality or kind. This assigns a level of importance to something.
Entrapment
Qualitative
DOS
Owner
12. Also known as a tunnel)
VPN (Virtual Private Network)
DOS
OLE
Private Addressing
13. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Macro
ROT-13
Out of band
Fraud
14. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
Illegal/Unethical
Throughput of a Biometric System
l0pht
Coax
15. To not be legal (as far as law is concerned) or ethical
Honey pot
Normalization
Illegal/Unethical
Wiretapping
16. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
ROT-13
War driving
Masquerade
Debug
17. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Hash
Out of band
Firmware
WAP (Wireless Application Protocol)
18. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
SSH
Technical - Administrative - Physical
Separation of duties
Trade Secret
19. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
SESAME
Cold Site
SSL/TLS
Cookies
20. A military standard defining controls for emanation protection
TEMPEST
CIRT
Due Diligence
Virtual Memory/Pagefile.sys
21. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Cyphertext only
Repeaters
Symmetric
Teardrop
22. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Custodian
Common criteria
Coax
Patent
23. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
Penetration testing
Security Perimeter
Data Mart
24. Involving the measurement of quantity or amount.
Social engineering
Security Perimeter
War driving
Quantitative
25. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Brewer-Nash model
Passive attacks
Brute force
Fire extinguisher
26. Dynamic Host Configuration Protocol.
Detective - Preventive - Corrective
Content dependant
Switches / Bridges
DHCP
27. Access control method for database based on the content of the database to provide granular access
Acceptable use
Content dependant
Substitution
Cyphertext only
28. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Packet Sniffing
ISDN (Integrated Services Digital Network)
Senior Management
Active attacks
29. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Keystroke logging
Skipjack
Detective - Preventive - Corrective
Certification
30. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Halon
Coax
Due Diligence
Trademark
31. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Symmetric
Switches / Bridges
SSL/TLS
Authorization creep
32. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
DMZ
Inference
Enticement
/etc/passwd
33. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Raid 0 - 1 - 3 - 5
Back door/ trap door/maintenance hook
Risk Analysis
Finger scanning
34. Making individuals accountable for their actions on a system typically through the use of auditing
Firewall types
Transposition
ROM (Read-only memory)
Accountability
35. Common Object Request Broker Architecture.
Cold Site
Eavesdropping
CORBA
Two-Factor Authentication
36. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Change management
Worm
Audit Trail
Base-64
37. A mechanism by which connections to TCP services on a system are allowed or disallowed
CIRT
Security through obscurity
SESAME
TCP Wrappers
38. Ethernet - Cat5 - Twisted to allow for longer runs.
BIA
Fraud
RAM (Random-access memory)
Twisted pair
39. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Honey pot
Incentive programs
DAD
Clipping levels
40. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Software
Well-known ports
Technical - Administrative - Physical
Tokens
41. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Tokens
Birthday attack
Security through obscurity
Certification
42. Someone whose hacking is primarily targeted at the phone systems
PKI
Bastion hosts
Phreaker
Two-Factor Authentication
43. Someone who hacks
TACACS (Terminal access controller access control system)
Keystroke logging
Artificial Neural Networks (ANN)
Hacker
44. A site that has some equipment in place - and can be up within days
Custodian
Warm Site
Risk Mitigation
SSH
45. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Hacker
Software
Covert channels
Repeaters
46. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
COOP
Out of band
Call tree
Non-repudiation
47. This is an open international standard for applications that use wireless communications.
WAP (Wireless Application Protocol)
Telnet
Qualitative
Multipartite
48. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Quality Assurance
Fire extinguisher
Change management
Software development lifecycle
49. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Schema
Well-known ports
Macro
Compiler
50. When one key of a two-key pair has more encryption pattern than the other
Polymorphic
Salami Slicing
Asymmetric
Format 7 times
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests