SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Random Number Base
ALE (Annualized Loss Expectancy)
Two-Factor Authentication
Nonce
Call tree
2. A military standard defining controls for emanation protection
CHAP
AES (Advanced Encryption Standard)
SLE (Single Loss Expectancy or Exposure)
TEMPEST
3. In the broadest sense - a fraud is a deception made for personal gain
Fraud
Data Mart
Base-64
Fraggle
4. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Hearsay Evidence
EF (Exposure Factor)
War dialing
Risk Transferring
5. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Decentralized
ARO (Annualized Rate of Occurrence)
Hackers
Common criteria
6. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Rolling hot sites
Twisted pair
Identification
Acceptable use
7. Object Linking and Embedding. The ability of an object to be embedded into another object.
Firewall types
OLE
Bastion hosts
Incentive programs
8. A network that uses standard protocols (TCP/IP)
Passive attacks
Format 7 times
Username/password
Open network
9. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Crosstalk
CIA
Risk Transferring
Throughput of a Biometric System
10. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Diffie-Hellman
Buffer overflow
Software
Exit interview
11. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Kerberos
Detective - Preventive - Corrective
Out of band
Data remanence
12. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Nonce
Qualitative
Finger scanning
Dumpster diving
13. Signal degradation as it moves farther from its source
Script
Sniffing
Attenuation
Symmetric
14. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Symmetric
Multitasking
DOS
Content dependant
15. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
Digital certificates
Passive attacks
Expert systems
ActiveX Object Linking and Embedding
16. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Script kiddies
Authentication
Dumpster diving
Salami Slicing
17. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Script kiddies
Social engineering
Cookies
Hacker
18. The person that controls access to the data
Custodian
FAR/FRR/CER
Finger scanning
SYN Flood
19. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Probing
Cookies
Classes of IP networks
FAR/FRR/CER
20. Common Object Request Broker Architecture.
ISDN (Integrated Services Digital Network)
CORBA
IRC
Content dependant
21. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
DOS
Substitution
Aggregation
DHCP
22. Personal - Network - and Application
Firewall types
Telnet
CEO
Expert systems
23. Making individuals accountable for their actions on a system typically through the use of auditing
Embezzlement
Accountability
Toneloc
Teardrop
24. When two or more processes are linked and execute multiple programs simultaneously
Multiprocessing
Eavesdropping
Code of ethics
Hacker
25. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Security through obscurity
Joke
Man trap
Teardrop
26. When security is managed at many different points in an organization
Compiler
CIO
Security kernel
Decentralized
27. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Authorization creep
Security kernel
Dumpster diving
Covert channels
28. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
DMZ
Acceptable use
Masquerade
Data Mart
29. Chief Executive Officer
Schema
SYN Flood
VPN (Virtual Private Network)
CEO
30. Emanations from one wire coupling with another wire
Termination procedures
SYN Flood
Crosstalk
ALE (Annualized Loss Expectancy)
31. These can be used to verify that public keys belong to certain individuals.
Dictionary Attack
CORBA
Fraud
Digital certificates
32. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
FAR/FRR/CER
Dictionary Attack
Cyphertext only
DCOM
33. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Software development lifecycle
VPN (Virtual Private Network)
Content dependant
Illegal/Unethical
34. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Accreditation
Trap Door
War dialing
Schema
35. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Debug
Transposition
Asset Value
Penetration testing
36. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
Nonce
Finger scanning
Enticement
Spoofing
37. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Technical - Administrative - Physical
TCP Wrappers
Active attacks
ISDN (Integrated Services Digital Network)
38. Threat to physical security.
Software librarian
Object Oriented Programming
TCP Wrappers
Sabotage
39. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
Asset Value
Finger scanning
EF (Exposure Factor)
OLE
40. A network entity that provides a single entrance / exit point to the Internet.
Bastion hosts
ARO (Annualized Rate of Occurrence)
ARP (Address Resolution Protocol)
Guards
41. Once authenticated - the level of access you have to a system
Social engineering
Authorization
TCP Wrappers
Birthday attack
42. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Macro
Cryptanalysis
SSH
Salami Slicing
43. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Enticement
Schema
Motion detector
Degausser
44. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Buffer overflow
Inference
Object Oriented Programming
Malware
45. A sandbox. Emulates an operating environment.
Multithreading
Back door/ trap door/maintenance hook
Virtual machine
Symmetric
46. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Copyright
Boot-sector Virus
Finger scanning
Repeaters
47. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Coax
Reciprocal agreement
Privacy Act of 1974
Script kiddies
48. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
DDOS
Risk Analysis
Noise & perturbation
OEP
49. Also civil law
Hearsay Evidence
ALE (Annualized Loss Expectancy)
Tort
Multitasking
50. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Honey pot
Worm
Clipper Chip
ISDN (Integrated Services Digital Network)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests