SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Enticement
Degausser
Burden of Proof
IAB
2. When two or more processes are linked and execute multiple programs simultaneously
TACACS (Terminal access controller access control system)
Multiprocessing
ARP (Address Resolution Protocol)
Trap Door
3. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
TCSEC
Asset Value
TACACS (Terminal access controller access control system)
Hearsay Evidence
4. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Private Addressing
SLE (Single Loss Expectancy or Exposure)
Trademark
Hearsay Evidence
5. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Session Hijacking
Fire extinguisher
l0pht
Software development lifecycle
6. When security is managed at a central point in an organization
Dogs
Centralized
Logic bomb
Polymorphism
7. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Biometrics
Script kiddies
Twisted pair
Dictionary Attack
8. Someone who hacks
Hacker
VPN (Virtual Private Network)
Wiretapping
CORBA
9. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Packet Sniffing
Object Oriented Programming
Echelon
Hearsay Evidence
10. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Sniffing
Hot Site
COM
Cold Site
11. A mechanism by which connections to TCP services on a system are allowed or disallowed
Job rotation
TCP Wrappers
DAD
Transposition
12. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Detective - Preventive - Corrective
Security through obscurity
Patent
Bugtraq
13. A network that uses standard protocols (TCP/IP)
Open network
Security kernel
Common criteria
Telnet
14. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Patent
Bastion hosts
Callback Security/Call Forwarding
DAD
15. Be at least 8 foot tall and have three strands of barbed wire.
Fences
Session Hijacking
TACACS (Terminal access controller access control system)
Buffer overflow
16. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Java
Multitasking
Multithreading
Active attacks
17. Enticing people to hit your honeypot to see how they try to access your system.
Hot Site
Patriot Act
Enticement
CHAP
18. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Embezzlement
Non-repudiation
Cryptanalysis
Block cipher
19. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Clipping levels
Security Perimeter
Script kiddies
Due Diligence
20. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
ROM (Read-only memory)
UUEncode
Authorization creep
Job rotation
21. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Custodian
Brute force
Aggregation
Due Diligence
22. Scanning the airwaves for radio transmissions
Symmetric
OEP
Dogs
Scanning
23. The practice of obtaining confidential information by manipulation of legitimate users.
CD-Rom
Motion detector
Social engineering
Call tree
24. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
ROT-13
Hackers
Buffer overflow
Format 7 times
25. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Polymorphism
Transposition
Code of ethics
Fiber optic
26. The art of breaking code. Testing the strength of an algorithm.
Risk Transferring
Cryptanalysis
Firewall types
Twisted pair
27. Method of authenticating to a system. Something that you supply and something you know.
Username/password
Packet Sniffing
Fraud
Risk Acceptance
28. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
PAP (Password Authentication Protocol)
Centralized
NAT
BIOS
29. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Rijndael
Virtual Memory/Pagefile.sys
Smurf
Clipper Chip
30. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Private Addressing
Buffer overflow
Transposition
Stream cipher
31. Also known as a tunnel)
Clipper Chip
VPN (Virtual Private Network)
Security kernel
Authentication
32. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Penetration testing
Fraggle
Fiber optic
Throughput of a Biometric System
33. A site that is ready physically but has no hardware in place - all it has is HVAC
Key Escrow
Guards
Cold Site
Covert channels
34. Occupant Emergency Plan - Employees are the most important!
Inference
Symmetric
OEP
Format 7 times
35. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Debug
Masquerade
Termination procedures
Software librarian
36. Basic Input/Output System
Rijndael
Cookies
SESAME
BIOS
37. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Callback Security/Call Forwarding
DDOS
Tailgating / Piggybacking
Caesar Cipher
38. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
WTLS (Wireless Transport Layer Security)
COM
Two-Factor Authentication
Script kiddies
39. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
TACACS (Terminal access controller access control system)
Noise & perturbation
Digest
Risk Analysis
40. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Hearsay Evidence
SLE (Single Loss Expectancy or Exposure)
OEP
Reciprocal agreement
41. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Hearsay Evidence
War driving
Man trap
Finger printing
42. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Phreaker
Multipartite
Tokens
Script kiddies
43. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Sniffing
Probing
Birthday attack
Two-Factor Authentication
44. The ability to have more than one thread associated with a process
Certification
Multithreading
COM
Scanning
45. Assuming someone's session who is unaware of what you are doing
Owner
Session Hijacking
Brute force
Software development lifecycle
46. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Tailgating / Piggybacking
PAP (Password Authentication Protocol)
Degausser
Rijndael
47. Software designed to infiltrate or damage a computer system - without the owner's consent.
Rolling hot sites
Teardrop
Coax
Malware
48. This is an open international standard for applications that use wireless communications.
Identification
Tokens
WAP (Wireless Application Protocol)
Finger printing
49. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Schema
Fraud
Expert systems
ISDN (Integrated Services Digital Network)
50. 'If you cant see it - its secure'. Bad policy to live by.
Open network
Security through obscurity
/etc/passwd
AES (Advanced Encryption Standard)