SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Decentralized
Security Perimeter
Sabotage
Substitution
2. A mechanism by which connections to TCP services on a system are allowed or disallowed
TCP Wrappers
Biometric profile
Hacker
Twisted pair
3. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Software development lifecycle
Honey pot
Non-repudiation
Call tree
4. Motivational tools for employee awareness to get them to report security flaws in an organization
Hoax
BIOS
SYN Flood
Incentive programs
5. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Carnivore
Noise & perturbation
Logic bomb
TCB
6. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
ROT-13
Cookies
OLE
Call tree
7. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
TCSEC
Authorization
ActiveX Object Linking and Embedding
Format 7 times
8. These can be used to verify that public keys belong to certain individuals.
Digital certificates
Code of ethics
NAT
Symmetric
9. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Security Awareness Training
IAB
SSH
Packet Sniffing
10. Rolling command center with UPS - satellite - uplink - power - etc.
Phreaker
Object Oriented Programming
Rolling hot sites
Brute force
11. Closed Circuit Television
Multitasking
Active attacks
CCTV
SSL/TLS
12. Computer Incident Response Team
RAM (Random-access memory)
CIRT
Certification
Penetration testing
13. Involving the measurement of quantity or amount.
Cold Site
Firewall types
Identification
Quantitative
14. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Hoax
Clipper Chip
Exit interview
Sniffing
15. Jumping into dumpsters to retrieve information about someone/something/a company
Dumpster diving
Encryption
Cryptanalysis
Telnet
16. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
BIOS
Script
Schema
Base-64
17. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Data remanence
Session Hijacking
Checksum
Polymorphism
18. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
MOM
l0pht
CRC (Cyclic Redundancy Check)
Skipjack
19. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Salami Slicing
Base-64
Trademark
Fraud
20. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
SSL/TLS
Hacker
BIA
Mandatory vacation
21. Dialing fixed sets telephone numbers looking for open modem connections to machines
l0pht
War dialing
Fences
IRC
22. Network devices that operate at layer 3. This device separates broadcast domains.
Carnivore
Accountability
Routers
Cryptanalysis
23. Access control method for database based on the content of the database to provide granular access
Digital signing
Content dependant
Throughput of a Biometric System
VPN (Virtual Private Network)
24. Emanations from one wire coupling with another wire
Classes of IP networks
Schema
Crosstalk
Trojan horses
25. Internet Relay Chat.
Virtual machine
Security kernel
IRC
Illegal/Unethical
26. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Risk Management
BIOS
Hash
Code of ethics
27. Continuation of Operations Plan
Routers
COOP
Hackers
Authorization
28. The user
Multipartite
User
Common criteria
Due Diligence
29. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
Transposition
Compiler
ARP (Address Resolution Protocol)
DNS cache poisoning
30. Scanning the airwaves for radio transmissions
Substitution
Schema
Scanning
Macro
31. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Transposition
Replay
Masquerade
Trap Door
32. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Two-Factor Authentication
Service packs
Telnet
Twisted pair
33. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Content dependant
Technical - Administrative - Physical
RADIUS (Remote authentication dial-in user service)
Buffer overflow
34. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
SESAME
Twisted pair
ROM (Read-only memory)
CIRT
35. Something used to put out a fire. Can be in Classes A - B - C - D - or H
ActiveX Object Linking and Embedding
Salami Slicing
Fire extinguisher
Audit Trail
36. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Birthday attack
Hardware
/etc/passwd
Back door/ trap door/maintenance hook
37. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Incentive programs
Skipjack
Custodian
Job rotation
38. A network that uses standard protocols (TCP/IP)
Hacker
Open network
Keystroke logging
Routers
39. Animals with teeth. Not as discriminate as guards
SESAME
Covert channels
Dogs
Data Mart
40. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Risk Management
Macro
DOS
TEMPEST
41. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Debug
War driving
CHAP
Bugtraq
42. Assuming someone's session who is unaware of what you are doing
Session Hijacking
Malware
Bastion hosts
Rijndael
43. Also civil law
Rolling hot sites
ROM (Read-only memory)
Compiler
Tort
44. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Risk Transferring
Base-64
CHAP
Trade Secret
45. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Job rotation
Fire extinguisher
Raid 0 - 1 - 3 - 5
Attenuation
46. Providing verification to a system
VPN (Virtual Private Network)
Authentication
Classes of IP networks
SSH
47. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Debug
Hot Site
Normalization
Security kernel
48. CISSPs subscribe to a code of ethics for building up the security profession
Trojan horses
Code of ethics
Senior Management
ISDN (Integrated Services Digital Network)
49. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
PAP (Password Authentication Protocol)
TEMPEST
Caesar Cipher
Probing
50. A network that uses proprietary protocols
ROT-13
Closed network
Tokens
Burden of Proof
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests