SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A RFC standard. A mechanism for performing commands on a remote system
Telnet
TCP Wrappers
EF (Exposure Factor)
RAM (Random-access memory)
2. A site that is ready physically but has no hardware in place - all it has is HVAC
Cold Site
Eavesdropping
Twisted pair
Trademark
3. Also civil law
Tort
Promiscuous mode
Finger scanning
Script
4. Relating to quality or kind. This assigns a level of importance to something.
Qualitative
Due Care
Fraud
Entrapment
5. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Symmetric
Security Perimeter
Rijndael
ROM (Read-only memory)
6. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
CIRT
Hardware
Fraud
Patent
7. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Kerberos
Embezzlement
Vulnerability analysis tools
SQL (Structured Query Language)
8. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Biometric profile
Hearsay Evidence
Toneloc
Job rotation
9. Signal degradation as it moves farther from its source
Macro
Inference
Job rotation
Attenuation
10. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Two-Factor Authentication
Security Awareness Training
Expert System
DDOS
11. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Substitution
Non-repudiation
Cold Site
Expert systems
12. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
EF (Exposure Factor)
OSI Model
Brewer-Nash model
Technical - Administrative - Physical
13. Setting up the user to access the honeypot for reasons other than the intent to harm.
Security Awareness Training
Wiretapping
Entrapment
BIA
14. A gas used in fire suppression. Not human safe. Chemical reaction.
Finger printing
Birthday attack
Halon
Phreaker
15. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
SSO (Single sign-on)
Exit interview
Brewer-Nash model
Hardware
16. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
BIA
Common criteria
Rijndael
PKI
17. Chief Executive Officer
CEO
Data remanence
Multiprocessing
Coax
18. Object Linking and Embedding. The ability of an object to be embedded into another object.
CIRT
Halon
OLE
Data Mart
19. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Call tree
Software development lifecycle
Degausser
Sabotage
20. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Brute Force
Block cipher
Birthday attack
Covert channels
21. A network that mimics the brain
Artificial Neural Networks (ANN)
Firewall types
Trap Door
Termination procedures
22. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Routers
Data Mart
DDOS
SYN Flood
23. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Detective - Preventive - Corrective
Macro
VLANs
DMZ
24. Must be in place for you to use a biometric system
SESAME
Software librarian
Biometric profile
SSH
25. When security is managed at many different points in an organization
Decentralized
SSL/TLS
Biometric profile
Normalization
26. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Granularity
Artificial Neural Networks (ANN)
Hackers
Block cipher
27. A system designed to stop piggybacking.
Dumpster diving
Tort
Man trap
Software librarian
28. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
SSL/TLS
Malware
Back door/ trap door/maintenance hook
DDOS
29. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Virtual machine
Custodian
WTLS (Wireless Transport Layer Security)
Hackers
30. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Attenuation
Salami Slicing
Joke
Multiprocessing
31. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
Hoax
Boot-sector Virus
PAP (Password Authentication Protocol)
Motion detector
32. Scanning the airwaves for radio transmissions
Firewall types
DHCP
Scanning
Kerberos
33. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
RAM (Random-access memory)
Security Perimeter
Patent
Certification
34. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Honey pot
Accreditation
Teardrop
Private Addressing
35. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
Asymmetric
Tailgating / Piggybacking
Hardware
DNS cache poisoning
36. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Polymorphic
CCTV
Granularity
Polymorphism
37. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.
Granularity
Accreditation
Malware
Custodian
38. Assuming someone's session who is unaware of what you are doing
Classes of IP networks
Malware
Session Hijacking
SESAME
39. Also known as a tunnel)
Hash
Qualitative
VPN (Virtual Private Network)
Clipper Chip
40. Data storage formats and equipment that allow the stored data to be accessed in any order
Cyphertext only
RAM (Random-access memory)
Certification
Telnet
41. Network devices that operate at layer 3. This device separates broadcast domains.
Polymorphism
TCP Wrappers
Routers
Noise & perturbation
42. Same as a block cipher except that it is applied to a data stream one bit at a time
OLE
Qualitative
Stream cipher
Block cipher
43. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Joke
Copyright
DDOS
Hot Site
44. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
Software
TCB
Service packs
Digital certificates
45. In the broadest sense - a fraud is a deception made for personal gain
Throughput of a Biometric System
Skipjack
Fraud
Acceptable use
46. Random Number Base
RADIUS (Remote authentication dial-in user service)
Well-known ports
Nonce
IRC
47. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
DCOM
Hot Site
Java
Mandatory vacation
48. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Callback Security/Call Forwarding
Quality Assurance
RADIUS (Remote authentication dial-in user service)
Out of band
49. Repeats the signal. It amplifies the signal before sending it on.
Owner
War driving
DOS
Repeaters
50. Reasonable doubt
Asset Value
CCTV
Burden of Proof
Keystroke logging
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests