SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Network devices that operate at layer 3. This device separates broadcast domains.
Burden of Proof
Routers
Hoax
VLANs
2. A network that uses proprietary protocols
Custodian
DCOM
Closed network
CD-Rom
3. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Classes of IP networks
Acceptable use
RAM (Random-access memory)
Base-64
4. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Passive attacks
Coax
Hearsay Evidence
Enticement
5. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
ActiveX Object Linking and Embedding
Bugtraq
Asymmetric
Qualitative
6. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Technical - Administrative - Physical
Entrapment
Hot Site
Call tree
7. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Wiretapping
Inference
ROM (Read-only memory)
Callback Security/Call Forwarding
8. To not be legal (as far as law is concerned) or ethical
Hubs
Illegal/Unethical
Caesar Cipher
Finger scanning
9. In a separation of duties model - this is where code is checked in and out
Software librarian
SSL/TLS
Raid 0 - 1 - 3 - 5
SYN Flood
10. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Enticement
Fire extinguisher
FAR/FRR/CER
Malware
11. Public Key Infrastructure
Rijndael
Security kernel
PKI
Bastion hosts
12. Accepting all packets
Promiscuous mode
PAP (Password Authentication Protocol)
Degausser
Honey pot
13. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Detective - Preventive - Corrective
Degausser
Script
Warm Site
14. Network device that operates at layer 1. Concentrator.
Mandatory vacation
Hubs
Private Addressing
Skipjack
15. Random Number Base
Repeaters
ISDN (Integrated Services Digital Network)
Nonce
Multithreading
16. A war dialing utility
Expert systems
Attenuation
Toneloc
DCOM
17. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
DNS cache poisoning
Private Addressing
Owner
Virtual Memory/Pagefile.sys
18. Object Linking and Embedding. The ability of an object to be embedded into another object.
SSL/TLS
Open network
Polymorphic
OLE
19. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
Copyright
Service packs
Enticement
Schema
20. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
Accountability
Tort
Enticement
21. The intercepting of conversations by unintended recipients
Hot Site
Eavesdropping
Promiscuous mode
WTLS (Wireless Transport Layer Security)
22. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Multithreading
ROT-13
Multipartite
SSL/TLS
23. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Joke
Macro
Patriot Act
Accreditation
24. Method of authenticating to a system. Something that you supply and something you know.
Scanning
Patent
Username/password
CCTV
25. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Motion detector
Technical - Administrative - Physical
Logic bomb
WTLS (Wireless Transport Layer Security)
26. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Hash
TCB
Sniffing
Software development lifecycle
27. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Format 7 times
Termination procedures
Virtual Memory/Pagefile.sys
Two-Factor Authentication
28. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Brute force
Hardware
SSO (Single sign-on)
Authorization creep
29. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Risk Analysis
Worm
TCSEC
Closed network
30. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Cookies
Closed network
Passive attacks
Object Oriented Programming
31. Reasonable doubt
Burden of Proof
Birthday attack
Brute Force
TEMPEST
32. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Passive attacks
SSL/TLS
Fraud
SYN Flood
33. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Finger scanning
SQL (Structured Query Language)
Custodian
Security kernel
34. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Digest
Kerberos
Routers
BIA
35. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
Hacker
CORBA
ARP (Address Resolution Protocol)
Risk Acceptance
36. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Substitution
Trademark
Security through obscurity
Script
37. The person that determines the permissions to files. The data owner.
Owner
Termination procedures
Audit Trail
Granularity
38. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Warm Site
Tokens
Bugtraq
Embezzlement
39. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Separation of duties
Bastion hosts
SSH
Active attacks
40. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Hubs
Back door/ trap door/maintenance hook
Substitution
Tokens
41. Assuming someone's session who is unaware of what you are doing
Cyphertext only
Session Hijacking
SSL/TLS
Quantitative
42. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Granularity
Degausser
DOS
Stream cipher
43. Access control method for database based on the content of the database to provide granular access
Probing
Virtual machine
Content dependant
Security through obscurity
44. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Digital signing
Phreaker
Brute Force
User
45. An attempt to trick the system into believing that something false is real
Hoax
Trade Secret
Probing
Keystroke logging
46. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Non-repudiation
WTLS (Wireless Transport Layer Security)
Multitasking
Termination procedures
47. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Multitasking
DDOS
ROM (Read-only memory)
CIO
48. Emanations from one wire coupling with another wire
Session Hijacking
Certification
Crosstalk
Format 7 times
49. A network that mimics the brain
Artificial Neural Networks (ANN)
ALE (Annualized Loss Expectancy)
Block cipher
Common criteria
50. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Buffer overflow
Polymorphism
Worm
Object Oriented Programming