SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Hubs
Diffie-Hellman
Hot Site
Fire extinguisher
2. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Rijndael
SYN Flood
Certification
Trap Door
3. Setting up the user to access the honeypot for reasons other than the intent to harm.
Fraggle
Compiler
Illegal/Unethical
Entrapment
4. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Masquerade
FAR/FRR/CER
Private Addressing
SSO (Single sign-on)
5. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Audit Trail
CGI (The Common Gateway Interface)
Non-repudiation
Common criteria
6. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
ROT-13
BIA
Format 7 times
Illegal/Unethical
7. Jumping into dumpsters to retrieve information about someone/something/a company
Dumpster diving
/etc/passwd
Trap Door
Rolling hot sites
8. Motivational tools for employee awareness to get them to report security flaws in an organization
Privacy Act of 1974
Base-64
Incentive programs
CEO
9. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Privacy Act of 1974
Birthday attack
Routers
Script
10. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Separation of duties
Authorization creep
COM
Probing
11. The real cost of acquiring/maintaining/developing a system
SQL (Structured Query Language)
Asset Value
Script
ActiveX Object Linking and Embedding
12. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
/etc/passwd
Virtual Memory/Pagefile.sys
Trojan horses
Risk Analysis
13. Someone who hacks
SSL/TLS
CEO
Custodian
Hacker
14. Basic Input/Output System
COM
Repeaters
Encryption
BIOS
15. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Symmetric
Motion detector
Active attacks
Substitution
16. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Mandatory vacation
COOP
Brewer-Nash model
Software
17. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Cryptanalysis
Accreditation
Hash
Risk Mitigation
18. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
ALE (Annualized Loss Expectancy)
Separation of duties
Trojan horses
Cookies
19. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Caesar Cipher
PAP (Password Authentication Protocol)
RAM (Random-access memory)
SSL/TLS
20. CISSPs subscribe to a code of ethics for building up the security profession
PKI
VPN (Virtual Private Network)
Code of ethics
Hash
21. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Compiler
Cold Site
Checksum
Guards
22. A network that mimics the brain
Man trap
Hearsay Evidence
Artificial Neural Networks (ANN)
Polymorphic
23. In cryptography - it is a block cipher
Polymorphic
Cryptanalysis
Symmetric
Skipjack
24. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Separation of duties
Stream cipher
Software
Out of band
25. Be at least 8 foot tall and have three strands of barbed wire.
Quality Assurance
Fences
Tokens
OSI Model
26. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Telnet
Smurf
Boot-sector Virus
Change management
27. A mechanism by which connections to TCP services on a system are allowed or disallowed
TCP Wrappers
CD-Rom
CCTV
Software librarian
28. A network that uses standard protocols (TCP/IP)
DOS
CEO
Cold Site
Open network
29. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Audit Trail
Bastion hosts
Owner
Replay
30. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Biometrics
Copyright
Hackers
Toneloc
31. In a separation of duties model - this is where code is checked in and out
SYN Flood
Artificial Neural Networks (ANN)
Software librarian
Script kiddies
32. When one key of a two-key pair has more encryption pattern than the other
Repeaters
EF (Exposure Factor)
Asymmetric
Dictionary Attack
33. These viruses usually infect both boot records and files.
Aggregation
Job rotation
Toneloc
Multipartite
34. Must be in place for you to use a biometric system
Biometric profile
ALE (Annualized Loss Expectancy)
Service packs
Content dependant
35. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
CIRT
Authorization creep
Object Oriented Programming
Caesar Cipher
36. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Embezzlement
CHAP
Base-64
Smurf
37. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
CD-Rom
Asset Value
SYN Flood
Worm
38. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Java
MOM
Multitasking
AES (Advanced Encryption Standard)
39. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
Script
CIA
Centralized
SLE (Single Loss Expectancy or Exposure)
40. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Sabotage
Transposition
Vulnerability analysis tools
Dumpster diving
41. A system designed to stop piggybacking.
Burden of Proof
Firmware
DOS
Man trap
42. 'If you cant see it - its secure'. Bad policy to live by.
Burden of Proof
DAD
Virtual machine
Security through obscurity
43. Scanning the airwaves for radio transmissions
DAD
Format 7 times
Scanning
Tokens
44. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Non-repudiation
Cryptanalysis
Trademark
Caesar Cipher
45. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Symmetric
Patriot Act
Clipping levels
Sniffing
46. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Security kernel
Centralized
Logic bomb
Senior Management
47. Defines the objects and their attributes that exist in a database.
Teardrop
Centralized
Schema
Normalization
48. A war dialing utility
Brewer-Nash model
COM
CORBA
Toneloc
49. Chief Executive Officer
Private Addressing
Block cipher
Data Mart
CEO
50. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Authorization creep
Security Perimeter
Back door/ trap door/maintenance hook
Username/password
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests