SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Once authenticated - the level of access you have to a system
Sniffing
Authorization
Macro
Throughput of a Biometric System
2. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Format 7 times
Granularity
CRC (Cyclic Redundancy Check)
Brewer-Nash model
3. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Security kernel
Security through obscurity
l0pht
CIRT
4. A hidden communications channel on a system that allows for the bypassing of the system security policy
Throughput of a Biometric System
Polymorphism
Kerberos
Covert channels
5. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Private Addressing
Carnivore
SSH
Data remanence
6. Motivational tools for employee awareness to get them to report security flaws in an organization
PKI
Incentive programs
Custodian
ROM (Read-only memory)
7. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Inference
Caesar Cipher
Keystroke logging
Transposition
8. A network entity that provides a single entrance / exit point to the Internet.
Cookies
Bastion hosts
SQL (Structured Query Language)
Sabotage
9. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
OSI Model
Risk Analysis
Switches / Bridges
Change management
10. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Script kiddies
ISDN (Integrated Services Digital Network)
Trap Door
OSI Model
11. In a separation of duties model - this is where code is checked in and out
Software librarian
ActiveX Object Linking and Embedding
Software
Technical - Administrative - Physical
12. The process of reducing your risks to an acceptable level based on your risk analysis
Fraud
Scanning
Risk Mitigation
Raid 0 - 1 - 3 - 5
13. Encompasses Risk Analysis and Risk Mitigation
Authorization creep
Qualitative
Risk Management
Logic bomb
14. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
DHCP
Fiber optic
Private Addressing
Finger printing
15. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.
Rijndael
Embezzlement
Accreditation
Coax
16. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
CRC (Cyclic Redundancy Check)
Code of ethics
Motion detector
Switches / Bridges
17. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
ARO (Annualized Rate of Occurrence)
Virtual Memory/Pagefile.sys
RADIUS (Remote authentication dial-in user service)
Promiscuous mode
18. The art of breaking code. Testing the strength of an algorithm.
Logic bomb
Cryptanalysis
Embezzlement
Cold Site
19. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Multiprocessing
SESAME
IAB
DOS
20. Motive - Opportunity - and Means. These deal with crime.
Security Perimeter
MOM
CRC (Cyclic Redundancy Check)
Expert System
21. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Brewer-Nash model
Firmware
Covert channels
Rijndael
22. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Artificial Neural Networks (ANN)
/etc/passwd
Raid 0 - 1 - 3 - 5
Clipping levels
23. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Smart cards
Degausser
DOS
Accountability
24. A mechanism by which connections to TCP services on a system are allowed or disallowed
Cookies
Normalization
Fraud
TCP Wrappers
25. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Masquerade
CEO
Quantitative
Artificial Neural Networks (ANN)
26. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
Tailgating / Piggybacking
Base-64
Quality Assurance
Packet Sniffing
27. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
User
Software librarian
Software
Raid 0 - 1 - 3 - 5
28. Disclosure - Alteration - Destruction. These things break the CIA triad
CEO
DAD
Digital certificates
Tort
29. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Common criteria
Multithreading
Biometrics
Security Awareness Training
30. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
CGI (The Common Gateway Interface)
TCSEC
Asset Value
Social engineering
31. Scanning the airwaves for radio transmissions
Boot-sector Virus
Senior Management
Scanning
Raid 0 - 1 - 3 - 5
32. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
DAD
Classes of IP networks
Debug
Cookies
33. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Job rotation
Virtual machine
Rolling hot sites
Format 7 times
34. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Multithreading
Raid 0 - 1 - 3 - 5
Boot-sector Virus
Joke
35. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Sabotage
NAT
Non-repudiation
Risk Acceptance
36. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Detective - Preventive - Corrective
Replay
RAM (Random-access memory)
UUEncode
37. Personal - Network - and Application
Two-Factor Authentication
CIRT
Firewall types
DNS cache poisoning
38. Chief Information Officer
Senior Management
CIO
DHCP
Clipper Chip
39. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Sabotage
FAR/FRR/CER
Nonce
Degausser
40. Internet Architecture Board. This board is responsible for protecting the Internet.
IAB
Halon
Authorization
DDOS
41. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Certification
Noise & perturbation
Promiscuous mode
Buffer overflow
42. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Patriot Act
Digital signing
Data Mart
Hearsay Evidence
43. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Multitasking
Private Addressing
AES (Advanced Encryption Standard)
Security through obscurity
44. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
Incentive programs
l0pht
Virtual Memory/Pagefile.sys
45. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Bastion hosts
Classes of IP networks
Brute force
Callback Security/Call Forwarding
46. This is an open international standard for applications that use wireless communications.
WAP (Wireless Application Protocol)
Replay
Sniffing
DHCP
47. Network devices that operate at layer 3. This device separates broadcast domains.
Routers
Username/password
ISDN (Integrated Services Digital Network)
Rolling hot sites
48. Dynamic Host Configuration Protocol.
Granularity
VPN (Virtual Private Network)
Active attacks
DHCP
49. Object Linking and Embedding. The ability of an object to be embedded into another object.
Username/password
Non-repudiation
OLE
VPN (Virtual Private Network)
50. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
DNS cache poisoning
Hash
RADIUS (Remote authentication dial-in user service)
Software librarian