SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Audit Trail
Fiber optic
Cyphertext only
Packet Sniffing
2. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
CD-Rom
Senior Management
Biometric profile
Symmetric
3. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
DNS cache poisoning
DAD
Clipper Chip
Brute force
4. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
Firmware
RADIUS (Remote authentication dial-in user service)
Closed network
Promiscuous mode
5. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
User
CD-Rom
SESAME
Virtual machine
6. Also known as a tunnel)
Incentive programs
VPN (Virtual Private Network)
Scanning
COM
7. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Fiber optic
Multiprocessing
Trap Door
Tailgating / Piggybacking
8. Continuation of Operations Plan
Rijndael
Packet Sniffing
Wiretapping
COOP
9. Component Object Model.
Certification
Security Perimeter
SLE (Single Loss Expectancy or Exposure)
COM
10. The user
User
Replay
Security through obscurity
Transposition
11. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
MitM
ISDN (Integrated Services Digital Network)
Bastion hosts
Normalization
12. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Caesar Cipher
Encryption
Data Mart
Vulnerability analysis tools
13. Enticing people to hit your honeypot to see how they try to access your system.
CD-Rom
Brute Force
Callback Security/Call Forwarding
Enticement
14. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
Honey pot
Inference
Tailgating / Piggybacking
Clipping levels
15. Must be in place for you to use a biometric system
ISDN (Integrated Services Digital Network)
Biometric profile
Carnivore
Crosstalk
16. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Out of band
NAT
ROM (Read-only memory)
Routers
17. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Due Diligence
Risk Acceptance
Software
Man trap
18. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
TACACS (Terminal access controller access control system)
Probing
Well-known ports
Hearsay Evidence
19. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Object Oriented Programming
VLANs
Aggregation
NAT
20. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
COM
Trademark
SSO (Single sign-on)
Macro
21. A network that uses proprietary protocols
Closed network
Artificial Neural Networks (ANN)
Halon
Hoax
22. Internet Architecture Board. This board is responsible for protecting the Internet.
Accreditation
IAB
Covert channels
War dialing
23. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
DMZ
Open network
Logic bomb
Cyphertext only
24. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Accreditation
Due Diligence
Tokens
Quality Assurance
25. Closed Circuit Television
Tokens
CCTV
CGI (The Common Gateway Interface)
Encryption
26. Good for distance - longer than 100M
Coax
Symmetric
Warm Site
ARO (Annualized Rate of Occurrence)
27. Threat to physical security.
Audit Trail
Cold Site
Sabotage
Fire extinguisher
28. Signal degradation as it moves farther from its source
Attenuation
DOS
Hot Site
Asset Value
29. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Switches / Bridges
Risk Analysis
Wiretapping
SESAME
30. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Switches / Bridges
Scanning
Job rotation
Multithreading
31. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Acceptable use
VPN (Virtual Private Network)
DMZ
Biometric profile
32. A hidden communications channel on a system that allows for the bypassing of the system security policy
Covert channels
UUEncode
Keystroke logging
Accountability
33. Personal - Network - and Application
Username/password
Firewall types
Block cipher
Non-repudiation
34. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Twisted pair
Back door/ trap door/maintenance hook
Logic bomb
Compiler
35. Dialing fixed sets telephone numbers looking for open modem connections to machines
War dialing
SYN Flood
OEP
Wiretapping
36. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Kerberos
Classes of IP networks
OSI Model
Software
37. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Two-Factor Authentication
Debug
User
Finger printing
38. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Block cipher
Symmetric
Open network
Content dependant
39. Motivational tools for employee awareness to get them to report security flaws in an organization
Incentive programs
Username/password
BIA
Closed network
40. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
CIA
Patriot Act
Compiler
Decentralized
41. Basic Input/Output System
DCOM
NAT
Brute force
BIOS
42. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
Replay
Honey pot
User
Decentralized
43. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Quantitative
Risk Acceptance
Tokens
Substitution
44. Same as a block cipher except that it is applied to a data stream one bit at a time
Stream cipher
Out of band
Senior Management
Tailgating / Piggybacking
45. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
ROT-13
Risk Analysis
Virtual Memory/Pagefile.sys
WAP (Wireless Application Protocol)
46. When security is managed at a central point in an organization
Fraud
Symmetric
Centralized
Switches / Bridges
47. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
Security Perimeter
CORBA
Security kernel
l0pht
48. Rolling command center with UPS - satellite - uplink - power - etc.
Tailgating / Piggybacking
Bugtraq
Rolling hot sites
Bastion hosts
49. Emanations from one wire coupling with another wire
Script
Software librarian
Crosstalk
Twisted pair
50. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
BIA
SESAME
Noise & perturbation