SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Teardrop
BIOS
Risk Analysis
WAP (Wireless Application Protocol)
2. In the broadest sense - a fraud is a deception made for personal gain
Patent
Fraud
Fraggle
ARO (Annualized Rate of Occurrence)
3. Reasonable doubt
Burden of Proof
Hearsay Evidence
Owner
Transposition
4. A network entity that provides a single entrance / exit point to the Internet.
Data remanence
Risk Mitigation
l0pht
Bastion hosts
5. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
SSH
Finger scanning
Sabotage
BIA
6. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
Object Oriented Programming
OSI Model
Multithreading
SLE (Single Loss Expectancy or Exposure)
7. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
CRC (Cyclic Redundancy Check)
COOP
ISDN (Integrated Services Digital Network)
Passive attacks
8. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
COM
Raid 0 - 1 - 3 - 5
Polymorphic
CRC (Cyclic Redundancy Check)
9. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Bugtraq
CORBA
Nonce
Vulnerability analysis tools
10. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Masquerade
Schema
Sniffing
Technical - Administrative - Physical
11. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
TACACS (Terminal access controller access control system)
CORBA
Patent
Cold Site
12. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Smart cards
Callback Security/Call Forwarding
Throughput of a Biometric System
Switches / Bridges
13. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Covert channels
Hot Site
Classes of IP networks
IAB
14. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Script kiddies
CHAP
Hubs
Biometric profile
15. Emanations from one wire coupling with another wire
Crosstalk
Promiscuous mode
Two-Factor Authentication
WAP (Wireless Application Protocol)
16. A gas used in fire suppression. Not human safe. Chemical reaction.
Macro
Halon
Raid 0 - 1 - 3 - 5
Nonce
17. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Bugtraq
Masquerade
Hot Site
Clipping levels
18. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Wiretapping
Classes of IP networks
War dialing
CHAP
19. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
DOS
Multiprocessing
Fences
Kerberos
20. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
Asset Value
Hacker
RADIUS (Remote authentication dial-in user service)
CEO
21. Scanning the airwaves for radio transmissions
DDOS
Service packs
DMZ
Scanning
22. When one key of a two-key pair has more encryption pattern than the other
Data Mart
Polymorphism
OLE
Asymmetric
23. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Multithreading
BIA
Polymorphism
Well-known ports
24. Also known as a tunnel)
VPN (Virtual Private Network)
OLE
Change management
Java
25. The art of breaking code. Testing the strength of an algorithm.
Cryptanalysis
Vulnerability analysis tools
Privacy Act of 1974
OEP
26. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Software
Granularity
DDOS
BIA
27. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Authentication
Format 7 times
Noise & perturbation
ARP (Address Resolution Protocol)
28. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
MOM
Common criteria
Sniffing
PKI
29. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Coax
Authorization creep
Switches / Bridges
Rijndael
30. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
TACACS (Terminal access controller access control system)
Hardware
ALE (Annualized Loss Expectancy)
Senior Management
31. The process of reducing your risks to an acceptable level based on your risk analysis
NAT
TCB
Boot-sector Virus
Risk Mitigation
32. Must be in place for you to use a biometric system
Biometric profile
TACACS (Terminal access controller access control system)
Phreaker
NAT
33. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Encryption
CIA
Risk Management
Owner
34. The ability to have more than one thread associated with a process
Multithreading
CEO
BIOS
TCB
35. Transferring your risk to someone else - typically an insurance company
EF (Exposure Factor)
DAD
Risk Transferring
Promiscuous mode
36. Providing verification to a system
Trap Door
War driving
Trade Secret
Authentication
37. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
SSO (Single sign-on)
Hash
Replay
Warm Site
38. Software designed to infiltrate or damage a computer system - without the owner's consent.
Honey pot
War dialing
Malware
Attenuation
39. The user
Hot Site
Two-Factor Authentication
User
Acceptable use
40. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Guards
DHCP
Polymorphic
/etc/passwd
41. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Security kernel
/etc/passwd
OEP
Honey pot
42. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
Security Awareness Training
Covert channels
Key Escrow
43. Rolling command center with UPS - satellite - uplink - power - etc.
Rolling hot sites
Cyphertext only
Burden of Proof
Throughput of a Biometric System
44. Disclosure - Alteration - Destruction. These things break the CIA triad
DAD
Key Escrow
Due Diligence
Transposition
45. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
AES (Advanced Encryption Standard)
Hardware
Fraggle
OSI Model
46. Signal degradation as it moves farther from its source
Enticement
Centralized
Attenuation
Social engineering
47. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Mandatory vacation
Penetration testing
Authorization creep
Java
48. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Private Addressing
CIO
Separation of duties
Substitution
49. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
PAP (Password Authentication Protocol)
RADIUS (Remote authentication dial-in user service)
Toneloc
Java
50. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Asymmetric
Mandatory vacation
Detective - Preventive - Corrective
Carnivore