SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Hackers
Script kiddies
Macro
User
2. These can be used to verify that public keys belong to certain individuals.
Teardrop
Normalization
Noise & perturbation
Digital certificates
3. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
CHAP
Multitasking
Hash
Switches / Bridges
4. 'If you cant see it - its secure'. Bad policy to live by.
Security through obscurity
Key Escrow
CIA
Authorization creep
5. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Security Perimeter
OLE
Exit interview
Trap Door
6. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
OSI Model
CGI (The Common Gateway Interface)
ALE (Annualized Loss Expectancy)
Private Addressing
7. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Polymorphic
Expert System
Honey pot
Authentication
8. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Finger printing
SYN Flood
Mandatory vacation
Authentication
9. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Separation of duties
Granularity
Due Care
ROM (Read-only memory)
10. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Caesar Cipher
Separation of duties
Trademark
VLANs
11. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
RADIUS (Remote authentication dial-in user service)
SSL/TLS
Halon
CEO
12. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Security Perimeter
Owner
Due Diligence
Skipjack
13. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
Firewall types
ActiveX Object Linking and Embedding
Separation of duties
DAD
14. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Polymorphism
Privacy Act of 1974
Sniffing
OSI Model
15. The person that controls access to the data
Custodian
Finger scanning
Entrapment
Fraud
16. Public Key Infrastructure
Skipjack
PKI
TCB
Promiscuous mode
17. Occupant Emergency Plan - Employees are the most important!
Copyright
Security kernel
Kerberos
OEP
18. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Script
Cookies
Salami Slicing
Embezzlement
19. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
PAP (Password Authentication Protocol)
Digital certificates
Detective - Preventive - Corrective
Exit interview
20. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
SSH
Trademark
Logic bomb
NAT
21. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Expert systems
RADIUS (Remote authentication dial-in user service)
War driving
Incentive programs
22. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
OLE
Risk Transferring
Vulnerability analysis tools
AES (Advanced Encryption Standard)
23. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Out of band
Cold Site
Encryption
Well-known ports
24. Animals with teeth. Not as discriminate as guards
Dogs
Multiprocessing
War driving
Trade Secret
25. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Copyright
Accountability
Nonce
Call tree
26. Once authenticated - the level of access you have to a system
Centralized
Fiber optic
Security kernel
Authorization
27. Signal degradation as it moves farther from its source
Attenuation
Quantitative
WTLS (Wireless Transport Layer Security)
Custodian
28. A network that uses proprietary protocols
Brute force
Closed network
Dumpster diving
Smurf
29. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.
CIO
Warm Site
Job rotation
Keystroke logging
30. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Noise & perturbation
Common criteria
Centralized
Transposition
31. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
CIA
Classes of IP networks
DOS
Man trap
32. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Telnet
ARP (Address Resolution Protocol)
Service packs
Technical - Administrative - Physical
33. Rolling command center with UPS - satellite - uplink - power - etc.
DNS cache poisoning
Rolling hot sites
Authentication
Dogs
34. An instance of a scripting language
Hearsay Evidence
Active attacks
Patriot Act
Script
35. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Rijndael
Trojan horses
Polymorphic
ARO (Annualized Rate of Occurrence)
36. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Malware
Diffie-Hellman
Penetration testing
Hearsay Evidence
37. A network that uses standard protocols (TCP/IP)
Open network
Smurf
Certification
Patriot Act
38. Be at least 8 foot tall and have three strands of barbed wire.
ROM (Read-only memory)
Fences
Trojan horses
Masquerade
39. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Common criteria
SYN Flood
Polymorphism
Digital signing
40. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Diffie-Hellman
Senior Management
Joke
SQL (Structured Query Language)
41. Same as a block cipher except that it is applied to a data stream one bit at a time
Warm Site
UUEncode
Risk Analysis
Stream cipher
42. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Biometrics
Copyright
Identification
VLANs
43. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Change management
MOM
TEMPEST
Hot Site
44. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
Digest
Virtual machine
Twisted pair
CRC (Cyclic Redundancy Check)
45. The ability to have more than one thread associated with a process
Multithreading
ARO (Annualized Rate of Occurrence)
Rolling hot sites
Replay
46. To not be legal (as far as law is concerned) or ethical
Senior Management
Scanning
Illegal/Unethical
Base-64
47. In cryptography - it is a block cipher
Polymorphic
Granularity
Skipjack
SESAME
48. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Multiprocessing
SLE (Single Loss Expectancy or Exposure)
EF (Exposure Factor)
Cookies
49. A sandbox. Emulates an operating environment.
IRC
Virtual machine
Quantitative
Cookies
50. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Mandatory vacation
Format 7 times
Bastion hosts
Trap Door
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests