SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Disclosure - Alteration - Destruction. These things break the CIA triad
Clipping levels
DAD
Skipjack
Repeaters
2. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Back door/ trap door/maintenance hook
Digital certificates
Spoofing
VLANs
3. Motive - Opportunity - and Means. These deal with crime.
COM
MOM
Toneloc
CIRT
4. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Security Perimeter
Noise & perturbation
CIA
Software
5. Network Address Translation
Schema
Format 7 times
NAT
Patent
6. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Hardware
Change management
ISDN (Integrated Services Digital Network)
Patriot Act
7. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Well-known ports
Back door/ trap door/maintenance hook
Vulnerability analysis tools
Expert System
8. Internet Architecture Board. This board is responsible for protecting the Internet.
Hash
Asset Value
Digest
IAB
9. Computer Incident Response Team
Asset Value
Trademark
FAR/FRR/CER
CIRT
10. Encompasses Risk Analysis and Risk Mitigation
Content dependant
TACACS (Terminal access controller access control system)
Risk Management
Open network
11. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Teardrop
UUEncode
Service packs
Privacy Act of 1974
12. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
TCSEC
Hubs
Penetration testing
Debug
13. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Joke
CHAP
Brute force
ActiveX Object Linking and Embedding
14. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Caesar Cipher
Malware
Noise & perturbation
Cyphertext only
15. Good for distance - longer than 100M
Service packs
Firewall types
Tokens
Coax
16. Motivational tools for employee awareness to get them to report security flaws in an organization
Attenuation
Carnivore
l0pht
Incentive programs
17. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
IRC
Out of band
Authentication
CRC (Cyclic Redundancy Check)
18. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Vulnerability analysis tools
Separation of duties
Call tree
Dogs
19. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Tort
/etc/passwd
Covert channels
Raid 0 - 1 - 3 - 5
20. Providing verification to a system
Authentication
Masquerade
Attenuation
Multitasking
21. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
OSI Model
Service packs
Key Escrow
Expert System
22. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Identification
BIA
Hardware
Due Care
23. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Trojan horses
DCOM
Multitasking
Passive attacks
24. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.
Multipartite
Accreditation
Virtual Memory/Pagefile.sys
Base-64
25. Same as a block cipher except that it is applied to a data stream one bit at a time
Expert System
Polymorphic
Multiprocessing
Stream cipher
26. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Polymorphism
CEO
VLANs
Patriot Act
27. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Patriot Act
Transposition
MitM
Polymorphic
28. Transferring your risk to someone else - typically an insurance company
Burden of Proof
DOS
Risk Transferring
Illegal/Unethical
29. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
DAD
Software librarian
Format 7 times
Mandatory vacation
30. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Patent
Back door/ trap door/maintenance hook
Nonce
CORBA
31. Using ICMP to diagram a network
Hacker
TACACS (Terminal access controller access control system)
Brute Force
Probing
32. Data storage formats and equipment that allow the stored data to be accessed in any order
Security Perimeter
Copyright
RAM (Random-access memory)
Teardrop
33. The art of breaking code. Testing the strength of an algorithm.
Hardware
Accountability
Cryptanalysis
Firmware
34. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
CHAP
Joke
Hash
Malware
35. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Dogs
Software development lifecycle
ARP (Address Resolution Protocol)
ARO (Annualized Rate of Occurrence)
36. A site that has some equipment in place - and can be up within days
Warm Site
CORBA
Twisted pair
Trojan horses
37. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Change management
Senior Management
Job rotation
Risk Analysis
38. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Code of ethics
Motion detector
Honey pot
Penetration testing
39. When two or more processes are linked and execute multiple programs simultaneously
Multiprocessing
Granularity
Dogs
Covert channels
40. A RFC standard. A mechanism for performing commands on a remote system
ROT-13
Brute Force
Quantitative
Telnet
41. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
DCOM
Audit Trail
Trade Secret
SLE (Single Loss Expectancy or Exposure)
42. When one key of a two-key pair has more encryption pattern than the other
Authorization creep
SQL (Structured Query Language)
Asymmetric
Well-known ports
43. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Software librarian
Accountability
Noise & perturbation
Macro
44. Threat to physical security.
Spoofing
Cookies
SSH
Sabotage
45. Repeats the signal. It amplifies the signal before sending it on.
Key Escrow
Salami Slicing
Coax
Repeaters
46. Network device that operates at layer 1. Concentrator.
Hacker
Hubs
ISDN (Integrated Services Digital Network)
Firmware
47. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Digital certificates
Object Oriented Programming
Smart cards
Phreaker
48. A site that is ready physically but has no hardware in place - all it has is HVAC
CORBA
Cold Site
Trade Secret
Man trap
49. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Checksum
Encryption
UUEncode
Multithreading
50. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
SSH
Risk Transferring
Hot Site
Polymorphism
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests