SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Virtual machine
Technical - Administrative - Physical
Passive attacks
Biometrics
2. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Phreaker
Teardrop
Risk Analysis
Birthday attack
3. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Noise & perturbation
EF (Exposure Factor)
OSI Model
ISDN (Integrated Services Digital Network)
4. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Risk Acceptance
Biometrics
SSH
Checksum
5. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Repeaters
Attenuation
SSL/TLS
Smurf
6. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
Trademark
Due Care
CHAP
Compiler
7. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Security kernel
Multitasking
Raid 0 - 1 - 3 - 5
Private Addressing
8. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
Private Addressing
Service packs
l0pht
Finger printing
9. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Two-Factor Authentication
Risk Management
Software librarian
War driving
10. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
ISDN (Integrated Services Digital Network)
Incentive programs
Checksum
Masquerade
11. Assuming someone's session who is unaware of what you are doing
Boot-sector Virus
Cryptanalysis
Session Hijacking
Halon
12. Distributed Component Object Model. Microsoft's implementation of CORBA.
Data Mart
DCOM
Transposition
Brute Force
13. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Brute Force
Java
Guards
Covert channels
14. The practice of obtaining confidential information by manipulation of legitimate users.
Social engineering
Finger scanning
Trade Secret
WTLS (Wireless Transport Layer Security)
15. A network entity that provides a single entrance / exit point to the Internet.
Aggregation
Bastion hosts
Virtual Memory/Pagefile.sys
TEMPEST
16. Dynamic Host Configuration Protocol.
DHCP
Embezzlement
Block cipher
Security Perimeter
17. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Attenuation
Fiber optic
Private Addressing
Trade Secret
18. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
ActiveX Object Linking and Embedding
Wiretapping
Virtual machine
Due Care
19. Good for distance - longer than 100M
CHAP
Common criteria
Coax
Warm Site
20. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Hoax
Expert System
Scanning
Wiretapping
21. A network that uses proprietary protocols
Closed network
Replay
Digital signing
Hubs
22. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Java
Hash
Virtual Memory/Pagefile.sys
OSI Model
23. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
Replay
Joke
Boot-sector Virus
Common criteria
24. Ethernet - Cat5 - Twisted to allow for longer runs.
DOS
Twisted pair
SSL/TLS
Software librarian
25. Motive - Opportunity - and Means. These deal with crime.
Patent
Fire extinguisher
MOM
SQL (Structured Query Language)
26. A technique to eliminate data redundancy.
Fraggle
Patriot Act
Rolling hot sites
Normalization
27. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Content dependant
TACACS (Terminal access controller access control system)
Block cipher
Compiler
28. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
WTLS (Wireless Transport Layer Security)
SSH
Skipjack
Diffie-Hellman
29. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Multitasking
Trademark
Noise & perturbation
Normalization
30. Basic Input/Output System
BIOS
Service packs
Noise & perturbation
FAR/FRR/CER
31. Chief Information Officer
Patent
Masquerade
Halon
CIO
32. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Multipartite
CGI (The Common Gateway Interface)
Switches / Bridges
Change management
33. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Hardware
Centralized
Risk Acceptance
DNS cache poisoning
34. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Inference
Vulnerability analysis tools
Dumpster diving
Birthday attack
35. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Data remanence
Compiler
Substitution
Finger scanning
36. Must be in place for you to use a biometric system
Script kiddies
CHAP
Authentication
Biometric profile
37. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Authorization creep
Expert System
Inference
Hoax
38. Data storage formats and equipment that allow the stored data to be accessed in any order
Raid 0 - 1 - 3 - 5
Open network
ISDN (Integrated Services Digital Network)
RAM (Random-access memory)
39. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
MitM
/etc/passwd
Patriot Act
SSL/TLS
40. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
ROT-13
Separation of duties
FAR/FRR/CER
Job rotation
41. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Trade Secret
Service packs
DAD
Patriot Act
42. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Copyright
TACACS (Terminal access controller access control system)
RAM (Random-access memory)
Script kiddies
43. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
SSL/TLS
Non-repudiation
Decentralized
Masquerade
44. The person that controls access to the data
Asset Value
Honey pot
TCP Wrappers
Custodian
45. A military standard defining controls for emanation protection
Mandatory vacation
DNS cache poisoning
Carnivore
TEMPEST
46. Public Key Infrastructure
Cryptanalysis
Bastion hosts
PKI
Copyright
47. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
COOP
Telnet
OEP
Finger scanning
48. Involving the measurement of quantity or amount.
Security kernel
Quantitative
War dialing
Cyphertext only
49. Disclosure - Alteration - Destruction. These things break the CIA triad
CCTV
Promiscuous mode
Data Mart
DAD
50. Continuation of Operations Plan
Bastion hosts
Format 7 times
COOP
Virtual Memory/Pagefile.sys