SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Kerberos
Encryption
Hubs
Dictionary Attack
2. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.
Risk Analysis
Stream cipher
BIOS
Accreditation
3. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Mandatory vacation
Cookies
Telnet
Technical - Administrative - Physical
4. Dialing fixed sets telephone numbers looking for open modem connections to machines
War dialing
Bastion hosts
Copyright
Artificial Neural Networks (ANN)
5. Closed Circuit Television
Authorization
TEMPEST
CCTV
TCB
6. Be at least 8 foot tall and have three strands of barbed wire.
Centralized
Brute Force
Fences
ROT-13
7. A network entity that provides a single entrance / exit point to the Internet.
Caesar Cipher
Centralized
Bastion hosts
Carnivore
8. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Script
Data remanence
Symmetric
Diffie-Hellman
9. Transferring your risk to someone else - typically an insurance company
l0pht
Senior Management
Encryption
Risk Transferring
10. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Telnet
Compiler
Polymorphism
Exit interview
11. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Senior Management
Masquerade
Callback Security/Call Forwarding
Certification
12. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Private Addressing
War driving
Substitution
Data remanence
13. Emanations from one wire coupling with another wire
Authorization
Reciprocal agreement
Key Escrow
Crosstalk
14. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Firmware
Covert channels
Risk Analysis
Raid 0 - 1 - 3 - 5
15. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Classes of IP networks
Call tree
Digest
Due Diligence
16. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
TACACS (Terminal access controller access control system)
Salami Slicing
Packet Sniffing
DOS
17. Network device that operates at layer 1. Concentrator.
Burden of Proof
Well-known ports
Hardware
Hubs
18. Same as a block cipher except that it is applied to a data stream one bit at a time
WTLS (Wireless Transport Layer Security)
MOM
FAR/FRR/CER
Stream cipher
19. Repeats the signal. It amplifies the signal before sending it on.
TEMPEST
Data Mart
ALE (Annualized Loss Expectancy)
Repeaters
20. Reasonable doubt
CORBA
Burden of Proof
Man trap
Data Mart
21. Someone who hacks
ISDN (Integrated Services Digital Network)
Identification
Tort
Hacker
22. Network devices that operate at layer 3. This device separates broadcast domains.
Keystroke logging
Object Oriented Programming
CD-Rom
Routers
23. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
Authentication
Dumpster diving
ActiveX Object Linking and Embedding
24. An instance of a scripting language
COOP
Script
Object Oriented Programming
Data Mart
25. A site that is ready physically but has no hardware in place - all it has is HVAC
Nonce
Passive attacks
Cold Site
Certification
26. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Spoofing
War driving
Script kiddies
Phreaker
27. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Data remanence
Switches / Bridges
Promiscuous mode
SYN Flood
28. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
AES (Advanced Encryption Standard)
Kerberos
Expert systems
Hardware
29. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Granularity
War driving
Qualitative
Social engineering
30. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Smurf
TEMPEST
Fraggle
Centralized
31. Accepting all packets
Security Perimeter
OLE
Promiscuous mode
Brute Force
32. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Transposition
Malware
IRC
SQL (Structured Query Language)
33. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Normalization
DHCP
Copyright
Common criteria
34. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Privacy Act of 1974
Active attacks
Throughput of a Biometric System
Audit Trail
35. Animals with teeth. Not as discriminate as guards
Dogs
Finger printing
Hot Site
WTLS (Wireless Transport Layer Security)
36. White hat l0pht
Bugtraq
Artificial Neural Networks (ANN)
Guards
Cryptanalysis
37. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Risk Transferring
Acceptable use
Raid 0 - 1 - 3 - 5
Masquerade
38. Personal - Network - and Application
Firewall types
Audit Trail
DAD
Kerberos
39. Enticing people to hit your honeypot to see how they try to access your system.
Enticement
Hacker
Nonce
Telnet
40. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Audit Trail
Raid 0 - 1 - 3 - 5
Penetration testing
Change management
41. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Cyphertext only
Multitasking
Virtual Memory/Pagefile.sys
MitM
42. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Risk Management
Macro
Fraggle
Reciprocal agreement
43. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Technical - Administrative - Physical
Malware
Base-64
Raid 0 - 1 - 3 - 5
44. Using ICMP to diagram a network
Motion detector
User
Degausser
Probing
45. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Teardrop
PKI
RADIUS (Remote authentication dial-in user service)
Smurf
46. 'If you cant see it - its secure'. Bad policy to live by.
Security through obscurity
CIO
Social engineering
Decentralized
47. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Rijndael
Smart cards
Identification
Software
48. Internet Architecture Board. This board is responsible for protecting the Internet.
IAB
Closed network
ActiveX Object Linking and Embedding
Mandatory vacation
49. Basic Input/Output System
RAM (Random-access memory)
BIOS
Non-repudiation
Hearsay Evidence
50. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Hearsay Evidence
MitM
Multitasking
Firmware
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests