SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
OSI Model
Salami Slicing
Replay
Change management
2. Method of authenticating to a system. Something that you supply and something you know.
Username/password
Asset Value
DMZ
Noise & perturbation
3. When security is managed at many different points in an organization
Artificial Neural Networks (ANN)
Replay
SQL (Structured Query Language)
Decentralized
4. Internet Architecture Board. This board is responsible for protecting the Internet.
Java
Bugtraq
IAB
ROM (Read-only memory)
5. Confidentiality - Integrity - and Availability
Fiber optic
SYN Flood
Biometrics
CIA
6. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Encryption
Detective - Preventive - Corrective
Authentication
SESAME
7. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Hoax
Raid 0 - 1 - 3 - 5
Asymmetric
Security Perimeter
8. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Risk Transferring
Toneloc
Expert System
Compiler
9. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Transposition
Masquerade
Hacker
Session Hijacking
10. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Rijndael
Promiscuous mode
Buffer overflow
Inference
11. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Patent
Noise & perturbation
Scanning
Telnet
12. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Worm
SESAME
ARP (Address Resolution Protocol)
Block cipher
13. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
ISDN (Integrated Services Digital Network)
Biometrics
Polymorphic
Mandatory vacation
14. A mechanism by which connections to TCP services on a system are allowed or disallowed
SQL (Structured Query Language)
Session Hijacking
TCB
TCP Wrappers
15. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Quantitative
Warm Site
Brute Force
Bugtraq
16. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Rolling hot sites
Promiscuous mode
Callback Security/Call Forwarding
Active attacks
17. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Hardware
Teardrop
War dialing
Hearsay Evidence
18. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
BIOS
Fences
Worm
Java
19. A network entity that provides a single entrance / exit point to the Internet.
Diffie-Hellman
BIOS
Toneloc
Bastion hosts
20. Basic Input/Output System
BIOS
Authorization creep
ROM (Read-only memory)
Trap Door
21. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
SQL (Structured Query Language)
Vulnerability analysis tools
COOP
Due Diligence
22. Involving the measurement of quantity or amount.
Quantitative
Worm
Hackers
Classes of IP networks
23. An instance of a scripting language
Data remanence
Script
Scanning
DDOS
24. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Masquerade
Carnivore
Caesar Cipher
Copyright
25. The user
Hacker
Classes of IP networks
User
War driving
26. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
ROT-13
ALE (Annualized Loss Expectancy)
Biometric profile
Mandatory vacation
27. Someone who hacks
Hacker
Object Oriented Programming
Stream cipher
Polymorphism
28. Repeats the signal. It amplifies the signal before sending it on.
Repeaters
Enticement
Digest
SSL/TLS
29. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Clipping levels
Senior Management
Back door/ trap door/maintenance hook
Trade Secret
30. When one key of a two-key pair has more encryption pattern than the other
Boot-sector Virus
Asymmetric
VPN (Virtual Private Network)
Guards
31. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Identification
Biometrics
Boot-sector Virus
Exit interview
32. Public Key Infrastructure
Service packs
Closed network
PKI
Incentive programs
33. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Salami Slicing
Penetration testing
Asymmetric
IRC
34. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Compiler
Boot-sector Virus
Patriot Act
Fire extinguisher
35. Must be in place for you to use a biometric system
Security Perimeter
VPN (Virtual Private Network)
Biometric profile
Inference
36. Relating to quality or kind. This assigns a level of importance to something.
Halon
Qualitative
Clipper Chip
IRC
37. The frequency with which a threat is expected to occur.
VPN (Virtual Private Network)
ARO (Annualized Rate of Occurrence)
Key Escrow
Bastion hosts
38. The art of breaking code. Testing the strength of an algorithm.
Multiprocessing
Cryptanalysis
Rolling hot sites
Vulnerability analysis tools
39. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
FAR/FRR/CER
Audit Trail
Software
ARP (Address Resolution Protocol)
40. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
UUEncode
Common criteria
WTLS (Wireless Transport Layer Security)
Data Mart
41. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Expert System
Man trap
Risk Management
OEP
42. Ethernet - Cat5 - Twisted to allow for longer runs.
Fences
Twisted pair
Brute Force
DHCP
43. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Sabotage
Crosstalk
Software librarian
TACACS (Terminal access controller access control system)
44. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Diffie-Hellman
Due Diligence
SYN Flood
Security Perimeter
45. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Eavesdropping
Embezzlement
Call tree
TCB
46. Continuation of Operations Plan
OSI Model
Dictionary Attack
Noise & perturbation
COOP
47. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
OLE
CHAP
War driving
DCOM
48. Distributed Component Object Model. Microsoft's implementation of CORBA.
DCOM
Non-repudiation
Sabotage
Sniffing
49. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
CD-Rom
Custodian
Bugtraq
Trade Secret
50. Someone whose hacking is primarily targeted at the phone systems
Phreaker
Multitasking
MOM
Fraggle