SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
IAB
CRC (Cyclic Redundancy Check)
Kerberos
Halon
2. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Eavesdropping
Inference
Two-Factor Authentication
Active attacks
3. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
PKI
Switches / Bridges
Classes of IP networks
Halon
4. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Burden of Proof
Repeaters
DNS cache poisoning
Checksum
5. Reasonable doubt
Security Awareness Training
OEP
Burden of Proof
War driving
6. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Halon
Buffer overflow
Tailgating / Piggybacking
Worm
7. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Software librarian
Technical - Administrative - Physical
/etc/passwd
Keystroke logging
8. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
Replay
Worm
Accountability
Authentication
9. Repeats the signal. It amplifies the signal before sending it on.
Repeaters
Polymorphic
Wiretapping
Exit interview
10. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Noise & perturbation
Reciprocal agreement
Trademark
Block cipher
11. When security is managed at many different points in an organization
Enticement
Decentralized
IRC
Common criteria
12. Making individuals accountable for their actions on a system typically through the use of auditing
Accountability
Multithreading
Multipartite
Fences
13. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Two-Factor Authentication
PKI
FAR/FRR/CER
MitM
14. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Guards
Worm
Job rotation
CEO
15. Signal degradation as it moves farther from its source
Attenuation
Code of ethics
Probing
Smurf
16. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Java
Username/password
Virtual machine
Digital certificates
17. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Motion detector
DCOM
SSH
Encryption
18. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Multipartite
Key Escrow
Senior Management
Classes of IP networks
19. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Raid 0 - 1 - 3 - 5
Software librarian
ALE (Annualized Loss Expectancy)
MOM
20. Good for distance - longer than 100M
Data remanence
Degausser
BIOS
Coax
21. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Out of band
Risk Management
Smart cards
Java
22. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
SYN Flood
Replay
Dogs
TEMPEST
23. Someone whose hacking is primarily targeted at the phone systems
Phreaker
Brewer-Nash model
Job rotation
Accountability
24. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Birthday attack
Warm Site
Aggregation
AES (Advanced Encryption Standard)
25. Ethernet - Cat5 - Twisted to allow for longer runs.
Masquerade
Twisted pair
Phreaker
Open network
26. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Phreaker
DOS
Finger scanning
Risk Mitigation
27. The ability to have more than one thread associated with a process
OEP
Software development lifecycle
Multithreading
NAT
28. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
TACACS (Terminal access controller access control system)
IAB
Mandatory vacation
Dogs
29. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
ISDN (Integrated Services Digital Network)
Trap Door
Granularity
Honey pot
30. Also civil law
Copyright
Tort
Stream cipher
Authorization
31. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
IRC
Boot-sector Virus
Code of ethics
Risk Mitigation
32. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Tokens
Virtual machine
Caesar Cipher
Custodian
33. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Vulnerability analysis tools
Smurf
Routers
OEP
34. A site that is ready physically but has no hardware in place - all it has is HVAC
RAM (Random-access memory)
Cold Site
Encryption
Mandatory vacation
35. A network that uses standard protocols (TCP/IP)
Firmware
Open network
Risk Management
Exit interview
36. When one key of a two-key pair has more encryption pattern than the other
Clipper Chip
/etc/passwd
Data remanence
Asymmetric
37. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
RAM (Random-access memory)
ActiveX Object Linking and Embedding
Mandatory vacation
Risk Acceptance
38. Occupant Emergency Plan - Employees are the most important!
Halon
WAP (Wireless Application Protocol)
Encryption
OEP
39. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
ROM (Read-only memory)
Tort
Bastion hosts
IAB
40. Chief Information Officer
Decentralized
CIO
Detective - Preventive - Corrective
Checksum
41. Method of authenticating to a system. Something that you supply and something you know.
Username/password
DAD
Multitasking
Hacker
42. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
Sabotage
Risk Management
Multithreading
ROT-13
43. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
IAB
WAP (Wireless Application Protocol)
Vulnerability analysis tools
Well-known ports
44. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Toneloc
Macro
Copyright
SQL (Structured Query Language)
45. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
Burden of Proof
Data Mart
UUEncode
46. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Worm
Tort
Acceptable use
Code of ethics
47. Emanations from one wire coupling with another wire
Crosstalk
Patent
Senior Management
Non-repudiation
48. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
ISDN (Integrated Services Digital Network)
WTLS (Wireless Transport Layer Security)
Finger printing
Brute force
49. A network entity that provides a single entrance / exit point to the Internet.
Trademark
Risk Acceptance
Centralized
Bastion hosts
50. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Separation of duties
Enticement
Authorization
Fire extinguisher
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests