SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Smurf
War driving
Schema
Multiprocessing
2. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
DDOS
Stream cipher
Man trap
Patent
3. Making individuals accountable for their actions on a system typically through the use of auditing
Accountability
DMZ
Eavesdropping
Attenuation
4. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Script
ALE (Annualized Loss Expectancy)
Authentication
Rijndael
5. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Security kernel
Qualitative
Base-64
Encryption
6. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Active attacks
SQL (Structured Query Language)
Cryptanalysis
Penetration testing
7. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
FAR/FRR/CER
IAB
Probing
COM
8. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Object Oriented Programming
Fences
Degausser
Closed network
9. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
MOM
Burden of Proof
Risk Management
10. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
ARP (Address Resolution Protocol)
Mandatory vacation
SLE (Single Loss Expectancy or Exposure)
Virtual Memory/Pagefile.sys
11. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
EF (Exposure Factor)
Open network
Well-known ports
Symmetric
12. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.
Trojan horses
Job rotation
Accreditation
DCOM
13. Confidentiality - Integrity - and Availability
CORBA
CIA
Service packs
l0pht
14. A network that uses standard protocols (TCP/IP)
Symmetric
Eavesdropping
IRC
Open network
15. More discriminate than dogs
Accountability
Guards
Coax
RADIUS (Remote authentication dial-in user service)
16. Motivational tools for employee awareness to get them to report security flaws in an organization
Technical - Administrative - Physical
Incentive programs
Bastion hosts
Enticement
17. Closed Circuit Television
CCTV
Degausser
Multiprocessing
CHAP
18. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
DHCP
Quantitative
Salami Slicing
Coax
19. Internet Architecture Board. This board is responsible for protecting the Internet.
Artificial Neural Networks (ANN)
IAB
TEMPEST
Macro
20. Threat to physical security.
Identification
Sabotage
Code of ethics
Back door/ trap door/maintenance hook
21. Occupant Emergency Plan - Employees are the most important!
OEP
Private Addressing
UUEncode
Halon
22. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Echelon
Rijndael
Compiler
Separation of duties
23. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
OEP
Birthday attack
Well-known ports
BIA
24. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
Honey pot
Halon
Patent
25. The art of breaking code. Testing the strength of an algorithm.
Asymmetric
Cryptanalysis
Biometrics
Reciprocal agreement
26. Entails planning and system actions to ensure that a project is following good quality management practices
ALE (Annualized Loss Expectancy)
Caesar Cipher
Quality Assurance
Software librarian
27. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
DNS cache poisoning
Firmware
Senior Management
RAM (Random-access memory)
28. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Motion detector
Hearsay Evidence
Quality Assurance
Digital signing
29. A RFC standard. A mechanism for performing commands on a remote system
Out of band
Cookies
Telnet
Accountability
30. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Security Awareness Training
Data remanence
Acceptable use
Burden of Proof
31. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Risk Acceptance
Polymorphic
SSL/TLS
Private Addressing
32. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Hearsay Evidence
Trademark
Call tree
VPN (Virtual Private Network)
33. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Passive attacks
Sniffing
Symmetric
Quantitative
34. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
NAT
Kerberos
Telnet
Active attacks
35. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Trademark
FAR/FRR/CER
Throughput of a Biometric System
Boot-sector Virus
36. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
User
ROM (Read-only memory)
Termination procedures
Man trap
37. Continuation of Operations Plan
COOP
Crosstalk
Username/password
WTLS (Wireless Transport Layer Security)
38. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Debug
Multithreading
VLANs
Symmetric
39. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Cyphertext only
Brute Force
Out of band
Finger scanning
40. Involving the measurement of quantity or amount.
Polymorphic
Change management
Out of band
Quantitative
41. A military standard defining controls for emanation protection
BIOS
WAP (Wireless Application Protocol)
Username/password
TEMPEST
42. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Toneloc
Back door/ trap door/maintenance hook
Cookies
Embezzlement
43. In cryptography - it is a block cipher
Audit Trail
Scanning
CHAP
Skipjack
44. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Toneloc
Block cipher
Expert systems
Substitution
45. Access control method for database based on the content of the database to provide granular access
War dialing
Patriot Act
Symmetric
Content dependant
46. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Fiber optic
Acceptable use
UUEncode
Honey pot
47. Someone whose hacking is primarily targeted at the phone systems
Bastion hosts
Asymmetric
Phreaker
Cryptanalysis
48. To not be legal (as far as law is concerned) or ethical
Illegal/Unethical
Diffie-Hellman
Digital certificates
Security kernel
49. The intercepting of conversations by unintended recipients
VLANs
Tort
Eavesdropping
AES (Advanced Encryption Standard)
50. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Virtual Memory/Pagefile.sys
Virtual machine
Normalization
Finger scanning
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests