SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Motivational tools for employee awareness to get them to report security flaws in an organization
Service packs
Incentive programs
Hacker
Software
2. Component Object Model.
Technical - Administrative - Physical
Virtual machine
COM
Classes of IP networks
3. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
CGI (The Common Gateway Interface)
Brewer-Nash model
Multiprocessing
TCB
4. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Tailgating / Piggybacking
Kerberos
Quality Assurance
Risk Acceptance
5. In cryptography - it is a block cipher
Active attacks
Skipjack
Wiretapping
Two-Factor Authentication
6. These can be used to verify that public keys belong to certain individuals.
Biometrics
Digital certificates
PKI
CRC (Cyclic Redundancy Check)
7. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
ALE (Annualized Loss Expectancy)
Custodian
Biometrics
Macro
8. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
WAP (Wireless Application Protocol)
DNS cache poisoning
Reciprocal agreement
Stream cipher
9. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Active attacks
Brewer-Nash model
Rolling hot sites
TCSEC
10. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
CHAP
Cyphertext only
Format 7 times
Security through obscurity
11. Confidentiality - Integrity - and Availability
CIA
Accountability
Substitution
Fraud
12. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Back door/ trap door/maintenance hook
IRC
Two-Factor Authentication
User
13. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Change management
Joke
AES (Advanced Encryption Standard)
Checksum
14. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Clipping levels
Polymorphism
Salami Slicing
VLANs
15. Encompasses Risk Analysis and Risk Mitigation
Software librarian
Clipper Chip
Separation of duties
Risk Management
16. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Toneloc
Compiler
PKI
Multiprocessing
17. Method of authenticating to a system. Something that you supply and something you know.
Checksum
Username/password
Quality Assurance
Brute Force
18. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Rolling hot sites
Checksum
ActiveX Object Linking and Embedding
Copyright
19. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Aggregation
MitM
ROM (Read-only memory)
Risk Acceptance
20. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Fire extinguisher
Well-known ports
War dialing
Birthday attack
21. Relating to quality or kind. This assigns a level of importance to something.
War dialing
Masquerade
Qualitative
Finger printing
22. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Replay
Attenuation
SESAME
Trade Secret
23. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
Change management
Boot-sector Virus
DDOS
Audit Trail
24. Internet Architecture Board. This board is responsible for protecting the Internet.
Polymorphism
IAB
OSI Model
Raid 0 - 1 - 3 - 5
25. Providing verification to a system
CCTV
Data Mart
Multiprocessing
Authentication
26. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
Checksum
VPN (Virtual Private Network)
ROM (Read-only memory)
ARP (Address Resolution Protocol)
27. An instance of a scripting language
Penetration testing
Buffer overflow
Diffie-Hellman
Script
28. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Finger scanning
Promiscuous mode
Senior Management
Call tree
29. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
DDOS
Accountability
Well-known ports
Service packs
30. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Due Care
Digest
Skipjack
Digital signing
31. The intercepting of conversations by unintended recipients
Scanning
Halon
TACACS (Terminal access controller access control system)
Eavesdropping
32. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
CGI (The Common Gateway Interface)
Brewer-Nash model
Finger scanning
Aggregation
33. A gas used in fire suppression. Not human safe. Chemical reaction.
Packet Sniffing
Asset Value
Halon
Trap Door
34. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Dumpster diving
Expert systems
Covert channels
Embezzlement
35. A sandbox. Emulates an operating environment.
MitM
Acceptable use
Virtual machine
SSH
36. Assuming someone's session who is unaware of what you are doing
TACACS (Terminal access controller access control system)
Spoofing
Back door/ trap door/maintenance hook
Session Hijacking
37. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Accreditation
VLANs
Audit Trail
Checksum
38. Chief Executive Officer
Hoax
CEO
Spoofing
Multithreading
39. A military standard defining controls for emanation protection
TEMPEST
Smart cards
Senior Management
Out of band
40. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Caesar Cipher
Trade Secret
Base-64
Authorization creep
41. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Audit Trail
Technical - Administrative - Physical
Tort
Smurf
42. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Polymorphic
Copyright
Biometric profile
Granularity
43. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Accreditation
Service packs
Change management
NAT
44. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
VPN (Virtual Private Network)
SSL/TLS
Identification
Trade Secret
45. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
CORBA
CD-Rom
Job rotation
Artificial Neural Networks (ANN)
46. Closed Circuit Television
Software development lifecycle
CIA
CCTV
Java
47. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Kerberos
Multiprocessing
CGI (The Common Gateway Interface)
Cold Site
48. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
Covert channels
DMZ
Tailgating / Piggybacking
Carnivore
49. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
CIRT
ROT-13
Attenuation
Cookies
50. Enticing people to hit your honeypot to see how they try to access your system.
Enticement
SSH
Object Oriented Programming
Qualitative