SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
ActiveX Object Linking and Embedding
Granularity
Security kernel
Smart cards
2. Be at least 8 foot tall and have three strands of barbed wire.
COOP
Key Escrow
Fences
Skipjack
3. The person that determines the permissions to files. The data owner.
Copyright
Expert systems
Owner
Acceptable use
4. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Fraggle
Copyright
Owner
Biometric profile
5. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Decentralized
Finger scanning
SLE (Single Loss Expectancy or Exposure)
Fraud
6. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
CRC (Cyclic Redundancy Check)
Passive attacks
Accreditation
Base-64
7. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
Asset Value
Trojan horses
l0pht
TEMPEST
8. Rolling command center with UPS - satellite - uplink - power - etc.
Hash
NAT
Rolling hot sites
Back door/ trap door/maintenance hook
9. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
TACACS (Terminal access controller access control system)
IAB
Replay
Software development lifecycle
10. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
Mandatory vacation
EF (Exposure Factor)
Acceptable use
ALE (Annualized Loss Expectancy)
11. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
Session Hijacking
Biometrics
SLE (Single Loss Expectancy or Exposure)
Clipping levels
12. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Promiscuous mode
Firmware
Hearsay Evidence
Cookies
13. A gas used in fire suppression. Not human safe. Chemical reaction.
Data remanence
Halon
/etc/passwd
Finger printing
14. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Script kiddies
Audit Trail
Accreditation
Risk Management
15. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
War dialing
Patent
Trap Door
TCP Wrappers
16. When one key of a two-key pair has more encryption pattern than the other
Asymmetric
Birthday attack
Authorization creep
Coax
17. Dynamic Host Configuration Protocol.
Aggregation
Out of band
Non-repudiation
DHCP
18. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
Tailgating / Piggybacking
Security through obscurity
Decentralized
Change management
19. Once authenticated - the level of access you have to a system
Toneloc
MitM
Authorization
Audit Trail
20. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Smurf
/etc/passwd
Format 7 times
Session Hijacking
21. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Schema
Covert channels
Two-Factor Authentication
Hackers
22. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Noise & perturbation
Birthday attack
Fiber optic
ROT-13
23. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
CIO
FAR/FRR/CER
Firmware
SQL (Structured Query Language)
24. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Common criteria
Well-known ports
Social engineering
WTLS (Wireless Transport Layer Security)
25. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Inference
Halon
Data remanence
OSI Model
26. The real cost of acquiring/maintaining/developing a system
War driving
Security Perimeter
Asset Value
Tort
27. Distributed Component Object Model. Microsoft's implementation of CORBA.
Telnet
Motion detector
FAR/FRR/CER
DCOM
28. A mechanism by which connections to TCP services on a system are allowed or disallowed
Software
ROM (Read-only memory)
Cookies
TCP Wrappers
29. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Echelon
DDOS
Brute force
BIOS
30. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
DMZ
Security kernel
CIA
Motion detector
31. To not be legal (as far as law is concerned) or ethical
SSH
Illegal/Unethical
Reciprocal agreement
Tort
32. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Caesar Cipher
Virtual Memory/Pagefile.sys
Diffie-Hellman
Active attacks
33. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Owner
Phreaker
OLE
Patriot Act
34. Accepting all packets
Classes of IP networks
OSI Model
Promiscuous mode
Teardrop
35. Jumping into dumpsters to retrieve information about someone/something/a company
Call tree
Debug
Routers
Dumpster diving
36. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
SSL/TLS
Active attacks
SYN Flood
NAT
37. Animals with teeth. Not as discriminate as guards
Authentication
Dogs
Sniffing
Privacy Act of 1974
38. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Block cipher
Embezzlement
Hardware
Inference
39. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Nonce
Buffer overflow
PKI
Qualitative
40. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
Separation of duties
Patriot Act
User
41. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Switches / Bridges
Detective - Preventive - Corrective
TCP Wrappers
CIRT
42. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Data remanence
Vulnerability analysis tools
Back door/ trap door/maintenance hook
Base-64
43. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Promiscuous mode
Security Awareness Training
SLE (Single Loss Expectancy or Exposure)
Authentication
44. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
CD-Rom
Mandatory vacation
WTLS (Wireless Transport Layer Security)
Acceptable use
45. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Firewall types
Inference
Penetration testing
VLANs
46. Common Object Request Broker Architecture.
VLANs
Risk Transferring
Attenuation
CORBA
47. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Halon
Reciprocal agreement
Sniffing
SSH
48. In a separation of duties model - this is where code is checked in and out
Session Hijacking
Software librarian
Macro
Risk Management
49. Chief Executive Officer
CEO
Rolling hot sites
TACACS (Terminal access controller access control system)
Security kernel
50. Entails planning and system actions to ensure that a project is following good quality management practices
Quality Assurance
Coax
ActiveX Object Linking and Embedding
Boot-sector Virus