SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Worm
War driving
Checksum
Digital signing
2. Distributed Component Object Model. Microsoft's implementation of CORBA.
TCP Wrappers
Centralized
DCOM
Hacker
3. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Owner
AES (Advanced Encryption Standard)
TCB
Brewer-Nash model
4. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
Security Awareness Training
Authentication
TCB
5. A network entity that provides a single entrance / exit point to the Internet.
Motion detector
Man trap
Bastion hosts
Transposition
6. These viruses usually infect both boot records and files.
Fire extinguisher
Multipartite
Quantitative
Asset Value
7. Disclosure - Alteration - Destruction. These things break the CIA triad
Certification
Man trap
DAD
Two-Factor Authentication
8. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Multitasking
Data Mart
Packet Sniffing
Expert systems
9. Also known as a tunnel)
VPN (Virtual Private Network)
Open network
SSL/TLS
Security through obscurity
10. Continuation of Operations Plan
COOP
OLE
Promiscuous mode
Rijndael
11. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Buffer overflow
Quality Assurance
Macro
Termination procedures
12. Computer Incident Response Team
OSI Model
TCP Wrappers
TEMPEST
CIRT
13. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
SESAME
Covert channels
Skipjack
Enticement
14. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Caesar Cipher
Common criteria
Probing
Key Escrow
15. Accepting all packets
Accreditation
Replay
Technical - Administrative - Physical
Promiscuous mode
16. Signal degradation as it moves farther from its source
Content dependant
Attenuation
Brute Force
Custodian
17. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Data remanence
Buffer overflow
Tokens
Block cipher
18. The frequency with which a threat is expected to occur.
Common criteria
ROT-13
Risk Acceptance
ARO (Annualized Rate of Occurrence)
19. White hat l0pht
Bugtraq
SLE (Single Loss Expectancy or Exposure)
SSO (Single sign-on)
Identification
20. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Honey pot
Software librarian
TACACS (Terminal access controller access control system)
Object Oriented Programming
21. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Due Care
Warm Site
Worm
Cyphertext only
22. Public Key Infrastructure
Risk Management
Non-repudiation
ROT-13
PKI
23. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Clipper Chip
Symmetric
Crosstalk
Asymmetric
24. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Security through obscurity
Session Hijacking
FAR/FRR/CER
Checksum
25. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Normalization
Hardware
Key Escrow
Toneloc
26. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Call tree
/etc/passwd
Session Hijacking
Masquerade
27. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Rijndael
Authorization
Out of band
Logic bomb
28. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Schema
Finger scanning
Data remanence
Security kernel
29. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Patriot Act
Substitution
Back door/ trap door/maintenance hook
Clipping levels
30. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
CHAP
Toneloc
Hackers
IRC
31. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Teardrop
Active attacks
Stream cipher
TCSEC
32. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Software
TACACS (Terminal access controller access control system)
Security through obscurity
DCOM
33. In the broadest sense - a fraud is a deception made for personal gain
Clipper Chip
Embezzlement
Hoax
Fraud
34. Must be in place for you to use a biometric system
Salami Slicing
Key Escrow
Virtual machine
Biometric profile
35. Motivational tools for employee awareness to get them to report security flaws in an organization
Fences
Security Perimeter
Incentive programs
Risk Mitigation
36. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Sniffing
Switches / Bridges
Non-repudiation
Fences
37. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Authentication
War driving
Finger scanning
Cryptanalysis
38. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Buffer overflow
Firewall types
Keystroke logging
Privacy Act of 1974
39. Repeats the signal. It amplifies the signal before sending it on.
Repeaters
Script kiddies
Wiretapping
Brute force
40. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Format 7 times
Incentive programs
Code of ethics
SSL/TLS
41. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Technical - Administrative - Physical
Checksum
MitM
Software development lifecycle
42. Be at least 8 foot tall and have three strands of barbed wire.
Worm
Java
Penetration testing
Fences
43. A technique to eliminate data redundancy.
Entrapment
Fiber optic
Transposition
Normalization
44. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Open network
Fraud
Motion detector
Separation of duties
45. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
SYN Flood
Fiber optic
Biometrics
Hackers
46. A sandbox. Emulates an operating environment.
UUEncode
Bastion hosts
Script
Virtual machine
47. Someone who hacks
Switches / Bridges
Job rotation
Hacker
CIA
48. A hidden communications channel on a system that allows for the bypassing of the system security policy
Covert channels
Packet Sniffing
Scanning
Trojan horses
49. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
Cold Site
Centralized
Security kernel
ActiveX Object Linking and Embedding
50. Enticing people to hit your honeypot to see how they try to access your system.
Enticement
Dumpster diving
Security kernel
Fraud
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests