SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Disclosure - Alteration - Destruction. These things break the CIA triad
WTLS (Wireless Transport Layer Security)
Detective - Preventive - Corrective
Man trap
DAD
2. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Incentive programs
RADIUS (Remote authentication dial-in user service)
Callback Security/Call Forwarding
Technical - Administrative - Physical
3. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Data Mart
Patriot Act
Trademark
Acceptable use
4. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
ActiveX Object Linking and Embedding
Trademark
Brute force
Digest
5. Also known as a tunnel)
Firmware
Fire extinguisher
VPN (Virtual Private Network)
Common criteria
6. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Rijndael
Teardrop
BIA
Hardware
7. Distributed Component Object Model. Microsoft's implementation of CORBA.
Callback Security/Call Forwarding
Audit Trail
CIO
DCOM
8. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
DAD
Closed network
Mandatory vacation
Data remanence
9. Dialing fixed sets telephone numbers looking for open modem connections to machines
Throughput of a Biometric System
War dialing
ARO (Annualized Rate of Occurrence)
Security through obscurity
10. Accepting all packets
Senior Management
Out of band
Trade Secret
Promiscuous mode
11. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Well-known ports
SQL (Structured Query Language)
Audit Trail
Raid 0 - 1 - 3 - 5
12. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
OLE
Centralized
Repeaters
ISDN (Integrated Services Digital Network)
13. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
CORBA
VPN (Virtual Private Network)
Echelon
Eavesdropping
14. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Audit Trail
Coax
Macro
Job rotation
15. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
Senior Management
Software
Active attacks
RADIUS (Remote authentication dial-in user service)
16. The process of reducing your risks to an acceptable level based on your risk analysis
Due Diligence
Multiprocessing
Debug
Risk Mitigation
17. These viruses usually infect both boot records and files.
Trademark
Compiler
Multipartite
TCP Wrappers
18. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Brewer-Nash model
DHCP
Change management
Masquerade
19. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Smurf
Security kernel
Throughput of a Biometric System
Software
20. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Classes of IP networks
Copyright
FAR/FRR/CER
Identification
21. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
Hearsay Evidence
Security Perimeter
Worm
Asymmetric
22. The real cost of acquiring/maintaining/developing a system
Asset Value
BIOS
Termination procedures
Man trap
23. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Brewer-Nash model
Checksum
CRC (Cyclic Redundancy Check)
Twisted pair
24. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Active attacks
War driving
Replay
Cyphertext only
25. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
Illegal/Unethical
SSO (Single sign-on)
Two-Factor Authentication
Debug
26. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Guards
Classes of IP networks
Logic bomb
WTLS (Wireless Transport Layer Security)
27. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Reciprocal agreement
Noise & perturbation
SQL (Structured Query Language)
Hubs
28. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Fire extinguisher
Senior Management
Halon
BIOS
29. The user
CEO
Security Perimeter
User
Spoofing
30. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Due Diligence
Digest
Multitasking
Masquerade
31. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Artificial Neural Networks (ANN)
Covert channels
Biometrics
Security kernel
32. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Hearsay Evidence
Noise & perturbation
Multipartite
Normalization
33. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Active attacks
AES (Advanced Encryption Standard)
Fire extinguisher
RAM (Random-access memory)
34. Dynamic Host Configuration Protocol.
Penetration testing
DHCP
Clipping levels
Tailgating / Piggybacking
35. Animals with teeth. Not as discriminate as guards
DAD
Biometric profile
Block cipher
Dogs
36. A network that uses standard protocols (TCP/IP)
DNS cache poisoning
Block cipher
Open network
Vulnerability analysis tools
37. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Code of ethics
Due Diligence
Passive attacks
Rijndael
38. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Security Perimeter
Centralized
Smart cards
SSH
39. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Hubs
AES (Advanced Encryption Standard)
Risk Management
Joke
40. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Brute Force
Spoofing
Switches / Bridges
FAR/FRR/CER
41. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Multiprocessing
Quality Assurance
Dictionary Attack
Privacy Act of 1974
42. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Inference
DMZ
UUEncode
Brute force
43. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
SSL/TLS
EF (Exposure Factor)
Transposition
Biometrics
44. The frequency with which a threat is expected to occur.
Biometric profile
ARO (Annualized Rate of Occurrence)
RADIUS (Remote authentication dial-in user service)
Call tree
45. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
CIRT
Private Addressing
Encryption
Cold Site
46. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Teardrop
Sniffing
Brute Force
War dialing
47. Setting up the user to access the honeypot for reasons other than the intent to harm.
Wiretapping
Brute Force
Transposition
Entrapment
48. Personal - Network - and Application
ISDN (Integrated Services Digital Network)
Firewall types
Echelon
Logic bomb
49. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Fire extinguisher
ALE (Annualized Loss Expectancy)
Non-repudiation
Copyright
50. Rolling command center with UPS - satellite - uplink - power - etc.
Noise & perturbation
Rolling hot sites
Firmware
ISDN (Integrated Services Digital Network)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests