SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Distributed Component Object Model. Microsoft's implementation of CORBA.
Open network
Switches / Bridges
DCOM
Patent
2. Network Address Translation
Qualitative
Risk Analysis
WAP (Wireless Application Protocol)
NAT
3. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Throughput of a Biometric System
Script kiddies
Toneloc
ISDN (Integrated Services Digital Network)
4. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Termination procedures
Multithreading
/etc/passwd
Man trap
5. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Patriot Act
Block cipher
Echelon
Degausser
6. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
SSH
Illegal/Unethical
Tokens
Termination procedures
7. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
DOS
Repeaters
Entrapment
Out of band
8. Defines the objects and their attributes that exist in a database.
ROM (Read-only memory)
Tort
Schema
Keystroke logging
9. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Packet Sniffing
Non-repudiation
TCB
DHCP
10. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Throughput of a Biometric System
Clipper Chip
Toneloc
Rolling hot sites
11. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
CGI (The Common Gateway Interface)
Hash
Throughput of a Biometric System
Accreditation
12. The art of breaking code. Testing the strength of an algorithm.
Cryptanalysis
FAR/FRR/CER
User
Code of ethics
13. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Back door/ trap door/maintenance hook
Brewer-Nash model
Patent
Private Addressing
14. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Buffer overflow
TCSEC
Digital certificates
Hearsay Evidence
15. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Dictionary Attack
Accreditation
Tort
Privacy Act of 1974
16. Ethernet - Cat5 - Twisted to allow for longer runs.
Call tree
Twisted pair
Data remanence
Enticement
17. More discriminate than dogs
Guards
Hoax
Virtual Memory/Pagefile.sys
DAD
18. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Security Awareness Training
DDOS
Accountability
Cyphertext only
19. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
CCTV
Keystroke logging
Termination procedures
Patriot Act
20. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Brute force
Security kernel
COOP
Polymorphism
21. A RFC standard. A mechanism for performing commands on a remote system
Senior Management
TCB
DCOM
Telnet
22. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
ActiveX Object Linking and Embedding
Active attacks
PAP (Password Authentication Protocol)
Digital certificates
23. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Birthday attack
Warm Site
Biometrics
Service packs
24. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Format 7 times
Macro
Security Awareness Training
l0pht
25. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Rijndael
Packet Sniffing
Common criteria
Encryption
26. Making individuals accountable for their actions on a system typically through the use of auditing
Coax
Accountability
PKI
SSL/TLS
27. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Compiler
Due Care
Packet Sniffing
DCOM
28. The process of reducing your risks to an acceptable level based on your risk analysis
Halon
Risk Mitigation
Logic bomb
Bastion hosts
29. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Java
Patriot Act
Firmware
Warm Site
30. Also civil law
Tort
BIOS
Social engineering
Symmetric
31. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Macro
BIOS
Audit Trail
Telnet
32. The user
MOM
User
Security through obscurity
Digest
33. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Firmware
Finger scanning
Sniffing
VPN (Virtual Private Network)
34. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Job rotation
CEO
MitM
OSI Model
35. Transferring your risk to someone else - typically an insurance company
Risk Transferring
Audit Trail
Cryptanalysis
Due Diligence
36. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Trade Secret
Hackers
SESAME
Risk Acceptance
37. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Entrapment
Trap Door
SYN Flood
Due Care
38. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Stream cipher
Change management
Illegal/Unethical
Carnivore
39. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
OEP
Brute Force
Service packs
Authentication
40. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Hubs
Social engineering
Wiretapping
Carnivore
41. Access control method for database based on the content of the database to provide granular access
Content dependant
DMZ
Hoax
Routers
42. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Service packs
Embezzlement
Polymorphic
Security Perimeter
43. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Symmetric
MitM
Cold Site
Expert System
44. Closed Circuit Television
CCTV
Illegal/Unethical
Base-64
Passive attacks
45. Good for distance - longer than 100M
DOS
COM
Coax
Biometrics
46. The frequency with which a threat is expected to occur.
Man trap
Raid 0 - 1 - 3 - 5
ARO (Annualized Rate of Occurrence)
TACACS (Terminal access controller access control system)
47. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Scanning
Sniffing
Well-known ports
Software
48. Computer Incident Response Team
DOS
Compiler
CIRT
Finger scanning
49. When security is managed at many different points in an organization
DAD
Decentralized
Open network
Call tree
50. Using ICMP to diagram a network
Probing
Bugtraq
Dogs
Telnet
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests