SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Boot-sector Virus
Worm
Biometrics
Transposition
2. A site that has some equipment in place - and can be up within days
Masquerade
Granularity
Warm Site
Hackers
3. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Fiber optic
Masquerade
CORBA
Switches / Bridges
4. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Trademark
Exit interview
Copyright
Accreditation
5. The intercepting of conversations by unintended recipients
Repeaters
COOP
Eavesdropping
Owner
6. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Boot-sector Virus
Detective - Preventive - Corrective
Inference
War driving
7. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
SSH
Stream cipher
Embezzlement
Polymorphism
8. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Software
Smart cards
Well-known ports
Trade Secret
9. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
SESAME
DDOS
Crosstalk
MitM
10. The act of identifying yourself. Providing your identity to a system
Replay
Identification
Checksum
AES (Advanced Encryption Standard)
11. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Private Addressing
Buffer overflow
Fraud
Software
12. Making individuals accountable for their actions on a system typically through the use of auditing
Accountability
Hoax
Patriot Act
SSL/TLS
13. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Normalization
Hearsay Evidence
Block cipher
Brute force
14. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Buffer overflow
Qualitative
Digital certificates
Virtual Memory/Pagefile.sys
15. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Crosstalk
Packet Sniffing
Carnivore
ActiveX Object Linking and Embedding
16. When two or more processes are linked and execute multiple programs simultaneously
Biometric profile
Multiprocessing
Fiber optic
ISDN (Integrated Services Digital Network)
17. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Fences
Digest
Due Care
Virtual machine
18. Distributed Component Object Model. Microsoft's implementation of CORBA.
Security Perimeter
Asset Value
Back door/ trap door/maintenance hook
DCOM
19. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Tort
Routers
Format 7 times
Tailgating / Piggybacking
20. Common Object Request Broker Architecture.
Smurf
Honey pot
Sniffing
CORBA
21. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Cyphertext only
Vulnerability analysis tools
Granularity
CORBA
22. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Custodian
MitM
Reciprocal agreement
IAB
23. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Fences
OEP
Hackers
Hearsay Evidence
24. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Multiprocessing
Session Hijacking
Data Mart
Trademark
25. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
NAT
Dumpster diving
Aggregation
Key Escrow
26. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Salami Slicing
Carnivore
DNS cache poisoning
Technical - Administrative - Physical
27. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
RADIUS (Remote authentication dial-in user service)
VPN (Virtual Private Network)
Out of band
Base-64
28. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Dumpster diving
Salami Slicing
AES (Advanced Encryption Standard)
Honey pot
29. Chief Information Officer
Logic bomb
CIO
Vulnerability analysis tools
Salami Slicing
30. 'If you cant see it - its secure'. Bad policy to live by.
Macro
DNS cache poisoning
Security through obscurity
Worm
31. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Digital signing
CRC (Cyclic Redundancy Check)
Probing
Decentralized
32. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
PKI
Joke
Coax
Skipjack
33. Transferring your risk to someone else - typically an insurance company
Service packs
Asymmetric
Risk Transferring
DNS cache poisoning
34. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
Worm
DDOS
Hacker
Hardware
35. Accepting all packets
Promiscuous mode
Owner
RAM (Random-access memory)
Echelon
36. When security is managed at a central point in an organization
Centralized
Expert System
Accreditation
Coax
37. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
Authorization creep
CRC (Cyclic Redundancy Check)
Toneloc
ActiveX Object Linking and Embedding
38. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.
IAB
Keystroke logging
SQL (Structured Query Language)
Phreaker
39. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Hubs
Covert channels
Clipper Chip
Eavesdropping
40. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Accountability
Cryptanalysis
BIOS
ROM (Read-only memory)
41. Threat to physical security.
Rijndael
Authorization creep
Sabotage
Passive attacks
42. Software designed to infiltrate or damage a computer system - without the owner's consent.
Malware
Senior Management
TEMPEST
Sabotage
43. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
Session Hijacking
Tort
Classes of IP networks
44. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
SSO (Single sign-on)
Multitasking
Authorization
Out of band
45. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
l0pht
TCB
WTLS (Wireless Transport Layer Security)
Virtual Memory/Pagefile.sys
46. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Symmetric
SQL (Structured Query Language)
Senior Management
Key Escrow
47. A network that mimics the brain
Artificial Neural Networks (ANN)
Copyright
Script kiddies
Hearsay Evidence
48. A network that uses proprietary protocols
Closed network
CIRT
MitM
Content dependant
49. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
SYN Flood
Classes of IP networks
Risk Acceptance
Technical - Administrative - Physical
50. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Wiretapping
Brute Force
Logic bomb
Polymorphism