SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
AES (Advanced Encryption Standard)
CHAP
Common criteria
Base-64
2. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Security Awareness Training
Skipjack
Granularity
Accountability
3. A site that is ready physically but has no hardware in place - all it has is HVAC
Logic bomb
Job rotation
Incentive programs
Cold Site
4. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Logic bomb
Classes of IP networks
Call tree
Multiprocessing
5. Relating to quality or kind. This assigns a level of importance to something.
Qualitative
Kerberos
Risk Mitigation
Decentralized
6. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Checksum
Buffer overflow
BIA
Detective - Preventive - Corrective
7. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Vulnerability analysis tools
Degausser
Debug
Hot Site
8. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
SESAME
Acceptable use
Authorization
Fiber optic
9. In a separation of duties model - this is where code is checked in and out
Out of band
Software librarian
Masquerade
UUEncode
10. When two or more processes are linked and execute multiple programs simultaneously
Keystroke logging
Debug
Multiprocessing
Biometric profile
11. Once authenticated - the level of access you have to a system
Degausser
Certification
Joke
Authorization
12. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
Code of ethics
Coax
DOS
13. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Artificial Neural Networks (ANN)
Raid 0 - 1 - 3 - 5
Social engineering
Cookies
14. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Private Addressing
Routers
Polymorphism
Smurf
15. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
User
Technical - Administrative - Physical
Crosstalk
Worm
16. Must be in place for you to use a biometric system
Toneloc
Biometric profile
Hearsay Evidence
Attenuation
17. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Polymorphic
Nonce
Cold Site
Privacy Act of 1974
18. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Raid 0 - 1 - 3 - 5
DOS
Active attacks
ARP (Address Resolution Protocol)
19. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
TCB
Repeaters
Crosstalk
Back door/ trap door/maintenance hook
20. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Bastion hosts
Brute force
UUEncode
WTLS (Wireless Transport Layer Security)
21. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Wiretapping
Detective - Preventive - Corrective
CIRT
CIO
22. Good for distance - longer than 100M
Coax
Cryptanalysis
Biometric profile
Illegal/Unethical
23. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Biometric profile
Risk Management
Transposition
WAP (Wireless Application Protocol)
24. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
CIO
Tokens
Risk Acceptance
War driving
25. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Two-Factor Authentication
ActiveX Object Linking and Embedding
Cold Site
Dumpster diving
26. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Separation of duties
Code of ethics
Acceptable use
Eavesdropping
27. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Digital certificates
Brewer-Nash model
Classes of IP networks
Burden of Proof
28. The art of breaking code. Testing the strength of an algorithm.
Security kernel
Cryptanalysis
Debug
Hackers
29. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
ROT-13
Crosstalk
Burden of Proof
Rijndael
30. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Diffie-Hellman
Keystroke logging
Toneloc
Software
31. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
VLANs
War dialing
Promiscuous mode
Patriot Act
32. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
Brewer-Nash model
Tokens
TCB
Throughput of a Biometric System
33. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Polymorphism
Closed network
Fire extinguisher
Security Perimeter
34. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Halon
Switches / Bridges
Cookies
Packet Sniffing
35. More discriminate than dogs
Guards
Software
CORBA
Security Perimeter
36. Public Key Infrastructure
PKI
CHAP
Spoofing
Virtual machine
37. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
Symmetric
Bugtraq
Key Escrow
38. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Finger printing
Hearsay Evidence
SESAME
Termination procedures
39. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Hardware
Warm Site
Common criteria
Penetration testing
40. A military standard defining controls for emanation protection
Eavesdropping
Repeaters
TEMPEST
DMZ
41. Motivational tools for employee awareness to get them to report security flaws in an organization
CCTV
Wiretapping
Honey pot
Incentive programs
42. Internet Relay Chat.
Authentication
IRC
Inference
Call tree
43. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Hardware
War driving
SESAME
Polymorphism
44. Access control method for database based on the content of the database to provide granular access
Content dependant
Tort
Due Diligence
Noise & perturbation
45. Transferring your risk to someone else - typically an insurance company
War dialing
Audit Trail
Out of band
Risk Transferring
46. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Hearsay Evidence
/etc/passwd
Accreditation
Clipping levels
47. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Finger scanning
Phreaker
Object Oriented Programming
SYN Flood
48. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Trade Secret
WTLS (Wireless Transport Layer Security)
Brewer-Nash model
Polymorphic
49. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
WTLS (Wireless Transport Layer Security)
Smurf
CGI (The Common Gateway Interface)
Format 7 times
50. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Cyphertext only
Boot-sector Virus
Firewall types
IRC