SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Cookies
Risk Transferring
Data Mart
Cold Site
2. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
AES (Advanced Encryption Standard)
Noise & perturbation
Compiler
Transposition
3. Setting up the user to access the honeypot for reasons other than the intent to harm.
Mandatory vacation
Copyright
Accountability
Entrapment
4. Closed Circuit Television
CCTV
Attenuation
NAT
Promiscuous mode
5. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
Service packs
CGI (The Common Gateway Interface)
CRC (Cyclic Redundancy Check)
Sniffing
6. Computer Incident Response Team
CIRT
Tort
l0pht
IRC
7. Method of authenticating to a system. Something that you supply and something you know.
VPN (Virtual Private Network)
Classes of IP networks
Username/password
Burden of Proof
8. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Centralized
Software
Fire extinguisher
Nonce
9. The output of a hash function is a digest.
ActiveX Object Linking and Embedding
Digest
Out of band
Finger scanning
10. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
OSI Model
DDOS
Man trap
UUEncode
11. A network that uses proprietary protocols
Content dependant
Risk Acceptance
Rolling hot sites
Closed network
12. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
CD-Rom
TCSEC
Callback Security/Call Forwarding
Worm
13. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Risk Acceptance
WTLS (Wireless Transport Layer Security)
Probing
Code of ethics
14. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Private Addressing
DOS
Caesar Cipher
CIA
15. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Switches / Bridges
Buffer overflow
Security kernel
Trade Secret
16. A military standard defining controls for emanation protection
TEMPEST
Software librarian
Acceptable use
Brute Force
17. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Common criteria
Patent
Security Perimeter
Normalization
18. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
Dumpster diving
Keystroke logging
Tailgating / Piggybacking
Firmware
19. Defines the objects and their attributes that exist in a database.
Senior Management
Schema
Mandatory vacation
Tailgating / Piggybacking
20. Network Address Translation
Buffer overflow
TEMPEST
Owner
NAT
21. A technique to eliminate data redundancy.
Polymorphic
CEO
Normalization
Detective - Preventive - Corrective
22. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
COOP
ROT-13
RAM (Random-access memory)
DCOM
23. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Active attacks
ALE (Annualized Loss Expectancy)
Data Mart
Qualitative
24. Relating to quality or kind. This assigns a level of importance to something.
TCSEC
Qualitative
Finger scanning
Security Perimeter
25. Be at least 8 foot tall and have three strands of barbed wire.
Fences
Object Oriented Programming
Replay
Aggregation
26. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
DCOM
Inference
Throughput of a Biometric System
Java
27. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
ROM (Read-only memory)
Embezzlement
Brute force
Worm
28. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Security Perimeter
Probing
Audit Trail
Brewer-Nash model
29. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Hearsay Evidence
PAP (Password Authentication Protocol)
Promiscuous mode
Wiretapping
30. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Compiler
Open network
Patent
Bastion hosts
31. Dynamic Host Configuration Protocol.
DHCP
CIRT
Out of band
Fire extinguisher
32. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Back door/ trap door/maintenance hook
Well-known ports
Polymorphic
OLE
33. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Object Oriented Programming
MOM
Tokens
Firmware
34. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
WTLS (Wireless Transport Layer Security)
Halon
Social engineering
Change management
35. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Software
UUEncode
SQL (Structured Query Language)
CGI (The Common Gateway Interface)
36. Assuming someone's session who is unaware of what you are doing
Session Hijacking
DHCP
ARP (Address Resolution Protocol)
Centralized
37. The person that controls access to the data
CRC (Cyclic Redundancy Check)
Teardrop
Custodian
Exit interview
38. Scanning the airwaves for radio transmissions
Hubs
Decentralized
Twisted pair
Scanning
39. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Artificial Neural Networks (ANN)
Hash
Honey pot
OSI Model
40. Also civil law
Stream cipher
Due Diligence
Tort
Trade Secret
41. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Centralized
Trap Door
Hacker
Normalization
42. Ethernet - Cat5 - Twisted to allow for longer runs.
Fraud
Twisted pair
Clipping levels
Trademark
43. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
OLE
Multitasking
Classes of IP networks
Multithreading
44. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Smart cards
Buffer overflow
OSI Model
Script kiddies
45. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Routers
TCB
UUEncode
Buffer overflow
46. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
CIA
Object Oriented Programming
AES (Advanced Encryption Standard)
Burden of Proof
47. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
ALE (Annualized Loss Expectancy)
Vulnerability analysis tools
NAT
Dumpster diving
48. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Senior Management
Granularity
/etc/passwd
Echelon
49. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Classes of IP networks
Buffer overflow
Encryption
VLANs
50. Involving the measurement of quantity or amount.
Quantitative
Warm Site
Cyphertext only
Senior Management