SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Buffer overflow
Entrapment
Fraggle
Multipartite
2. Data storage formats and equipment that allow the stored data to be accessed in any order
Call tree
Finger printing
RAM (Random-access memory)
Buffer overflow
3. The person that controls access to the data
Penetration testing
Custodian
Trojan horses
BIA
4. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Wiretapping
CIA
ALE (Annualized Loss Expectancy)
Base-64
5. Method of authenticating to a system. Something that you supply and something you know.
Username/password
TEMPEST
TCP Wrappers
Brute force
6. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
Incentive programs
Caesar Cipher
Degausser
CHAP
7. A hidden communications channel on a system that allows for the bypassing of the system security policy
Penetration testing
OLE
Centralized
Covert channels
8. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
Switches / Bridges
Brute Force
CGI (The Common Gateway Interface)
Callback Security/Call Forwarding
9. Network device that operates at layer 1. Concentrator.
Hubs
Closed network
Multithreading
Data Mart
10. Dynamic Host Configuration Protocol.
War driving
DHCP
Tort
Malware
11. White hat l0pht
Hacker
Classes of IP networks
CCTV
Bugtraq
12. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Accreditation
Illegal/Unethical
Dictionary Attack
Boot-sector Virus
13. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Burden of Proof
SQL (Structured Query Language)
Transposition
TCB
14. Repeats the signal. It amplifies the signal before sending it on.
Repeaters
Copyright
Common criteria
Asset Value
15. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Aggregation
Private Addressing
DNS cache poisoning
Coax
16. Animals with teeth. Not as discriminate as guards
Illegal/Unethical
Inference
Security Perimeter
Dogs
17. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
BIOS
Debug
Service packs
Change management
18. A war dialing utility
Toneloc
Detective - Preventive - Corrective
Private Addressing
Back door/ trap door/maintenance hook
19. Occupant Emergency Plan - Employees are the most important!
NAT
OEP
OLE
Content dependant
20. Disclosure - Alteration - Destruction. These things break the CIA triad
CIRT
Biometric profile
DAD
Eavesdropping
21. Assuming someone's session who is unaware of what you are doing
Scanning
Session Hijacking
Kerberos
Script kiddies
22. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Detective - Preventive - Corrective
Data Mart
OEP
Symmetric
23. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Trap Door
Copyright
Authorization
Sniffing
24. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Cryptanalysis
Callback Security/Call Forwarding
COM
Technical - Administrative - Physical
25. A military standard defining controls for emanation protection
TEMPEST
Teardrop
Encryption
TCSEC
26. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Two-Factor Authentication
OLE
Polymorphism
Multitasking
27. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Finger printing
Format 7 times
Biometrics
Hackers
28. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Spoofing
Crosstalk
SSH
Privacy Act of 1974
29. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Back door/ trap door/maintenance hook
WAP (Wireless Application Protocol)
Incentive programs
Smurf
30. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Scanning
Fire extinguisher
Session Hijacking
Polymorphism
31. Confidentiality - Integrity - and Availability
Exit interview
Expert System
Callback Security/Call Forwarding
CIA
32. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Open network
Separation of duties
Spoofing
Crosstalk
33. A network entity that provides a single entrance / exit point to the Internet.
Base-64
DAD
Brute force
Bastion hosts
34. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Bugtraq
Fraud
Expert systems
Nonce
35. Object Linking and Embedding. The ability of an object to be embedded into another object.
ARO (Annualized Rate of Occurrence)
Burden of Proof
Privacy Act of 1974
OLE
36. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Software librarian
Classes of IP networks
PAP (Password Authentication Protocol)
Block cipher
37. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Script kiddies
l0pht
Sabotage
Sniffing
38. Chief Executive Officer
Probing
CEO
Replay
DHCP
39. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
SESAME
EF (Exposure Factor)
COM
Finger printing
40. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Service packs
Classes of IP networks
Hash
TEMPEST
41. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Fraud
Debug
SSO (Single sign-on)
Passive attacks
42. The act of identifying yourself. Providing your identity to a system
Quality Assurance
Identification
Phreaker
Data remanence
43. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Mandatory vacation
WTLS (Wireless Transport Layer Security)
TACACS (Terminal access controller access control system)
VPN (Virtual Private Network)
44. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Asymmetric
Illegal/Unethical
Biometric profile
ROM (Read-only memory)
45. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Switches / Bridges
Biometrics
Mandatory vacation
Job rotation
46. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
AES (Advanced Encryption Standard)
Service packs
Passive attacks
Hot Site
47. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
RADIUS (Remote authentication dial-in user service)
Digital signing
Multitasking
WTLS (Wireless Transport Layer Security)
48. Common Object Request Broker Architecture.
Malware
ARP (Address Resolution Protocol)
Callback Security/Call Forwarding
CORBA
49. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Callback Security/Call Forwarding
CORBA
Multipartite
Fiber optic
50. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
SLE (Single Loss Expectancy or Exposure)
ROM (Read-only memory)
RADIUS (Remote authentication dial-in user service)
Code of ethics
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests