SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Object Linking and Embedding. The ability of an object to be embedded into another object.
Coax
Identification
Inference
OLE
2. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Patent
Exit interview
Expert systems
Replay
3. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Logic bomb
DHCP
Trap Door
DDOS
4. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Normalization
Birthday attack
Biometrics
Covert channels
5. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
Trojan horses
Object Oriented Programming
Promiscuous mode
SSO (Single sign-on)
6. To not be legal (as far as law is concerned) or ethical
Authorization creep
Illegal/Unethical
SSL/TLS
Logic bomb
7. A gas used in fire suppression. Not human safe. Chemical reaction.
Smurf
Toneloc
TACACS (Terminal access controller access control system)
Halon
8. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Bugtraq
Switches / Bridges
Two-Factor Authentication
Fences
9. Distributed Component Object Model. Microsoft's implementation of CORBA.
Accountability
Granularity
Toneloc
DCOM
10. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
CCTV
Trademark
Cryptanalysis
Digital certificates
11. Chief Executive Officer
CEO
Well-known ports
Session Hijacking
Polymorphic
12. A sandbox. Emulates an operating environment.
Sniffing
Spoofing
Virtual machine
BIA
13. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
ARO (Annualized Rate of Occurrence)
Private Addressing
Fiber optic
Expert System
14. The intercepting of conversations by unintended recipients
Cold Site
Eavesdropping
Technical - Administrative - Physical
Copyright
15. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Common criteria
Sabotage
Dictionary Attack
Brewer-Nash model
16. The act of identifying yourself. Providing your identity to a system
Digest
Qualitative
Identification
Format 7 times
17. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Checksum
Call tree
Multiprocessing
Attenuation
18. Providing verification to a system
Callback Security/Call Forwarding
Authentication
ROM (Read-only memory)
Kerberos
19. Data storage formats and equipment that allow the stored data to be accessed in any order
Debug
RAM (Random-access memory)
Fiber optic
Teardrop
20. A military standard defining controls for emanation protection
NAT
TEMPEST
SSH
Hash
21. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Burden of Proof
Hash
Well-known ports
Risk Mitigation
22. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Transposition
Biometrics
Macro
Security through obscurity
23. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
RADIUS (Remote authentication dial-in user service)
Copyright
Hackers
Packet Sniffing
24. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Security kernel
Block cipher
Risk Transferring
COOP
25. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
Trademark
Clipper Chip
Skipjack
ActiveX Object Linking and Embedding
26. A technique to eliminate data redundancy.
Object Oriented Programming
Normalization
Virtual Memory/Pagefile.sys
Nonce
27. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.
Multithreading
Digest
Accreditation
DNS cache poisoning
28. Network devices that operate at layer 3. This device separates broadcast domains.
TACACS (Terminal access controller access control system)
Transposition
Routers
Fraggle
29. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Risk Analysis
Skipjack
Audit Trail
ALE (Annualized Loss Expectancy)
30. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
User
Salami Slicing
Virtual machine
31. A network that uses standard protocols (TCP/IP)
Digital signing
Firmware
Open network
Session Hijacking
32. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
SSL/TLS
Java
Block cipher
ROT-13
33. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
DHCP
Technical - Administrative - Physical
Due Care
Fiber optic
34. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
TCB
Well-known ports
Key Escrow
Software librarian
35. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Multiprocessing
Salami Slicing
Throughput of a Biometric System
Rolling hot sites
36. Network device that operates at layer 1. Concentrator.
Asymmetric
Hubs
Replay
Owner
37. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Owner
Authentication
MitM
Key Escrow
38. A network that mimics the brain
Artificial Neural Networks (ANN)
User
Packet Sniffing
SESAME
39. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
Base-64
Risk Mitigation
DCOM
CGI (The Common Gateway Interface)
40. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Clipper Chip
Incentive programs
Call tree
Script kiddies
41. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Tokens
Hot Site
Firmware
Asymmetric
42. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s
Polymorphism
Diffie-Hellman
SSH
EF (Exposure Factor)
43. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Job rotation
COOP
FAR/FRR/CER
Privacy Act of 1974
44. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Due Care
Nonce
Firmware
Social engineering
45. Component Object Model.
COM
Authentication
Cryptanalysis
Common criteria
46. Emanations from one wire coupling with another wire
Bugtraq
Crosstalk
Multitasking
Scanning
47. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Trojan horses
Authorization creep
Passive attacks
Trap Door
48. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Reciprocal agreement
Authorization creep
CRC (Cyclic Redundancy Check)
Penetration testing
49. Basic Input/Output System
Session Hijacking
BIOS
Owner
SLE (Single Loss Expectancy or Exposure)
50. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Data remanence
Software
Social engineering
Polymorphism
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests