SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
TCB
Digest
Biometrics
Hacker
2. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Entrapment
Security Awareness Training
Telnet
CIA
3. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Telnet
Code of ethics
Checksum
Teardrop
4. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
CIO
Worm
Virtual Memory/Pagefile.sys
Spoofing
5. A hidden communications channel on a system that allows for the bypassing of the system security policy
Digest
Symmetric
Diffie-Hellman
Covert channels
6. A network that mimics the brain
Common criteria
Artificial Neural Networks (ANN)
Quality Assurance
Smurf
7. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
SSL/TLS
Sabotage
Change management
Motion detector
8. A site that has some equipment in place - and can be up within days
Warm Site
Encryption
Asymmetric
ISDN (Integrated Services Digital Network)
9. Accepting all packets
SESAME
Routers
Schema
Promiscuous mode
10. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Checksum
FAR/FRR/CER
MitM
Substitution
11. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
AES (Advanced Encryption Standard)
Social engineering
EF (Exposure Factor)
Digest
12. When security is managed at a central point in an organization
Certification
Centralized
Open network
COM
13. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
SSH
Biometric profile
Scanning
Multithreading
14. Someone who hacks
Probing
Firewall types
Risk Management
Hacker
15. The practice of obtaining confidential information by manipulation of legitimate users.
Checksum
Asset Value
Crosstalk
Social engineering
16. A mechanism by which connections to TCP services on a system are allowed or disallowed
Buffer overflow
Acceptable use
TCP Wrappers
Expert System
17. Dynamic Host Configuration Protocol.
Hoax
Software
DHCP
Man trap
18. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Teardrop
Audit Trail
Technical - Administrative - Physical
Non-repudiation
19. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
ARP (Address Resolution Protocol)
Multitasking
Multithreading
MOM
20. A military standard defining controls for emanation protection
TEMPEST
SSO (Single sign-on)
Teardrop
ARP (Address Resolution Protocol)
21. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Replay
Eavesdropping
NAT
TACACS (Terminal access controller access control system)
22. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Carnivore
ISDN (Integrated Services Digital Network)
Packet Sniffing
Reciprocal agreement
23. 'If you cant see it - its secure'. Bad policy to live by.
Authorization creep
Hubs
Security through obscurity
Audit Trail
24. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
ROT-13
Inference
Brute Force
CRC (Cyclic Redundancy Check)
25. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Expert System
Penetration testing
Security Awareness Training
CIA
26. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Multipartite
Cryptanalysis
COM
Smart cards
27. Relating to quality or kind. This assigns a level of importance to something.
Qualitative
Expert systems
Detective - Preventive - Corrective
Echelon
28. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Software
Vulnerability analysis tools
Transposition
Audit Trail
29. Entails planning and system actions to ensure that a project is following good quality management practices
Quality Assurance
Tort
Scanning
Identification
30. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
PAP (Password Authentication Protocol)
Sniffing
Raid 0 - 1 - 3 - 5
War dialing
31. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Passive attacks
SSL/TLS
Risk Acceptance
EF (Exposure Factor)
32. Enticing people to hit your honeypot to see how they try to access your system.
Software librarian
Enticement
Routers
Out of band
33. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Certification
Out of band
Man trap
Granularity
34. The act of identifying yourself. Providing your identity to a system
Identification
Sabotage
Trademark
Firewall types
35. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
Acceptable use
TCB
Checksum
Asymmetric
36. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
DAD
Trap Door
TCSEC
WTLS (Wireless Transport Layer Security)
37. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Logic bomb
Hackers
Fire extinguisher
Scanning
38. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Format 7 times
Man trap
DCOM
Risk Acceptance
39. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Rijndael
Object Oriented Programming
Script kiddies
Substitution
40. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Polymorphism
CD-Rom
Java
Well-known ports
41. Someone whose hacking is primarily targeted at the phone systems
Throughput of a Biometric System
Phreaker
EF (Exposure Factor)
Noise & perturbation
42. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.
Object Oriented Programming
WAP (Wireless Application Protocol)
Accreditation
Expert systems
43. A gas used in fire suppression. Not human safe. Chemical reaction.
Macro
Qualitative
Software development lifecycle
Halon
44. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Noise & perturbation
Biometric profile
Quality Assurance
Hot Site
45. The frequency with which a threat is expected to occur.
ARO (Annualized Rate of Occurrence)
Custodian
Fraggle
Software
46. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Firmware
Caesar Cipher
Risk Analysis
Java
47. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Virtual machine
Cyphertext only
Private Addressing
Open network
48. Scanning the airwaves for radio transmissions
Dumpster diving
CIA
Script
Scanning
49. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
Embezzlement
DNS cache poisoning
Java
DMZ
50. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Expert System
Penetration testing
PAP (Password Authentication Protocol)
Multithreading