SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Degausser
Risk Acceptance
CRC (Cyclic Redundancy Check)
Finger scanning
2. The ability to have more than one thread associated with a process
Schema
Code of ethics
Multithreading
SESAME
3. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Key Escrow
TCSEC
Detective - Preventive - Corrective
Encryption
4. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
Base-64
Hubs
DDOS
Smurf
5. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
Asset Value
Burden of Proof
Echelon
Worm
6. The person that controls access to the data
Hoax
Granularity
Custodian
Smart cards
7. A hidden communications channel on a system that allows for the bypassing of the system security policy
Covert channels
Masquerade
CORBA
Vulnerability analysis tools
8. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
War driving
Job rotation
Two-Factor Authentication
COOP
9. Basic Input/Output System
Hackers
BIOS
Macro
Replay
10. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Throughput of a Biometric System
Checksum
ROM (Read-only memory)
Authorization creep
11. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Privacy Act of 1974
Hot Site
Vulnerability analysis tools
Risk Management
12. When security is managed at many different points in an organization
COOP
Joke
Motion detector
Decentralized
13. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Skipjack
Compiler
IRC
Privacy Act of 1974
14. CISSPs subscribe to a code of ethics for building up the security profession
Hacker
Illegal/Unethical
Hackers
Code of ethics
15. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Fraggle
TEMPEST
Passive attacks
Joke
16. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Encryption
Service packs
AES (Advanced Encryption Standard)
Open network
17. Transferring your risk to someone else - typically an insurance company
OSI Model
Fraggle
Risk Transferring
Inference
18. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Data Mart
Degausser
Motion detector
MitM
19. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Throughput of a Biometric System
MOM
Illegal/Unethical
Echelon
20. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Attenuation
Content dependant
Due Care
Technical - Administrative - Physical
21. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Clipper Chip
Hot Site
Fraggle
WAP (Wireless Application Protocol)
22. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Packet Sniffing
Smart cards
WAP (Wireless Application Protocol)
Trade Secret
23. Also civil law
Packet Sniffing
Tort
Penetration testing
Clipping levels
24. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Hash
Coax
Noise & perturbation
Aggregation
25. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Authorization creep
Expert System
Dogs
Teardrop
26. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
Block cipher
Spoofing
Smart cards
Script kiddies
27. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Callback Security/Call Forwarding
Promiscuous mode
Passive attacks
MitM
28. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Repeaters
Rijndael
Authentication
Security Perimeter
29. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
Bugtraq
Trojan horses
Due Care
30. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Man trap
DMZ
Cyphertext only
Cookies
31. Data storage formats and equipment that allow the stored data to be accessed in any order
RAM (Random-access memory)
DDOS
Tokens
Authorization creep
32. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
SSO (Single sign-on)
COM
Termination procedures
SSL/TLS
33. Computer Incident Response Team
CIRT
Brute Force
IAB
CEO
34. White hat l0pht
Bugtraq
Trap Door
OLE
Brute Force
35. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
ALE (Annualized Loss Expectancy)
WTLS (Wireless Transport Layer Security)
CIA
Hoax
36. Access control method for database based on the content of the database to provide granular access
Sabotage
Fire extinguisher
Content dependant
Macro
37. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Copyright
/etc/passwd
Packet Sniffing
WAP (Wireless Application Protocol)
38. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
WTLS (Wireless Transport Layer Security)
Call tree
Covert channels
Normalization
39. The person that determines the permissions to files. The data owner.
Twisted pair
Trademark
Incentive programs
Owner
40. Enticing people to hit your honeypot to see how they try to access your system.
Hash
Crosstalk
Enticement
Asymmetric
41. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Object Oriented Programming
FAR/FRR/CER
Salami Slicing
Trade Secret
42. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Object Oriented Programming
SSL/TLS
Risk Management
Script kiddies
43. A military standard defining controls for emanation protection
TEMPEST
OLE
Sniffing
Classes of IP networks
44. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Virtual machine
TCB
Two-Factor Authentication
IAB
45. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Brute Force
Finger printing
Virtual Memory/Pagefile.sys
Switches / Bridges
46. Someone who hacks
Hacker
COM
Man trap
Base-64
47. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Scanning
CGI (The Common Gateway Interface)
Active attacks
Brewer-Nash model
48. The practice of obtaining confidential information by manipulation of legitimate users.
VLANs
Telnet
Social engineering
Rijndael
49. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Trade Secret
Hackers
TACACS (Terminal access controller access control system)
Decentralized
50. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Expert System
Change management
Firmware
Termination procedures