SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Qualitative
FAR/FRR/CER
Packet Sniffing
Honey pot
2. When two or more processes are linked and execute multiple programs simultaneously
Substitution
Multiprocessing
Repeaters
Brewer-Nash model
3. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Boot-sector Virus
Expert systems
Masquerade
Service packs
4. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
Data Mart
Patriot Act
Certification
5. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
Detective - Preventive - Corrective
Motion detector
SQL (Structured Query Language)
6. To not be legal (as far as law is concerned) or ethical
l0pht
ARO (Annualized Rate of Occurrence)
Illegal/Unethical
BIOS
7. The intercepting of conversations by unintended recipients
Eavesdropping
Schema
NAT
Malware
8. Closed Circuit Television
SSL/TLS
CIA
CCTV
Multitasking
9. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Hash
Script
Polymorphic
COOP
10. White hat l0pht
Risk Acceptance
VLANs
Hubs
Bugtraq
11. Enticing people to hit your honeypot to see how they try to access your system.
Honey pot
Well-known ports
Teardrop
Enticement
12. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Spoofing
Change management
Coax
Active attacks
13. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
SYN Flood
UUEncode
Centralized
Twisted pair
14. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Privacy Act of 1974
Decentralized
Substitution
Enticement
15. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
TCSEC
Mandatory vacation
SSL/TLS
Degausser
16. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Change management
Security kernel
CRC (Cyclic Redundancy Check)
Closed network
17. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
Spoofing
Scanning
CIA
Polymorphic
18. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
Wiretapping
TCP Wrappers
EF (Exposure Factor)
Warm Site
19. The art of breaking code. Testing the strength of an algorithm.
Cryptanalysis
ROT-13
Risk Transferring
Malware
20. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Multitasking
Risk Mitigation
Common criteria
Audit Trail
21. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Java
Macro
Buffer overflow
ROM (Read-only memory)
22. In the broadest sense - a fraud is a deception made for personal gain
Fraud
Hot Site
Common criteria
Telnet
23. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Trojan horses
Dumpster diving
Digest
Detective - Preventive - Corrective
24. Random Number Base
Warm Site
SESAME
Nonce
Malware
25. Good for distance - longer than 100M
Repeaters
Java
Raid 0 - 1 - 3 - 5
Coax
26. Animals with teeth. Not as discriminate as guards
Fences
Repeaters
Macro
Dogs
27. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Telnet
Guards
IAB
Fiber optic
28. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Cyphertext only
Copyright
CEO
MitM
29. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Throughput of a Biometric System
Security through obscurity
Finger scanning
Joke
30. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Classes of IP networks
Warm Site
TACACS (Terminal access controller access control system)
Polymorphism
31. Rolling command center with UPS - satellite - uplink - power - etc.
Bugtraq
Script kiddies
Rolling hot sites
Multipartite
32. Basic Input/Output System
Fences
l0pht
DHCP
BIOS
33. A network that uses standard protocols (TCP/IP)
Open network
ARO (Annualized Rate of Occurrence)
Bastion hosts
FAR/FRR/CER
34. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
Throughput of a Biometric System
Separation of duties
SESAME
CRC (Cyclic Redundancy Check)
35. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Packet Sniffing
Halon
Accreditation
Polymorphism
36. Someone who hacks
Hacker
Enticement
SLE (Single Loss Expectancy or Exposure)
Risk Analysis
37. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
TCP Wrappers
Stream cipher
Trade Secret
SQL (Structured Query Language)
38. This is an open international standard for applications that use wireless communications.
WAP (Wireless Application Protocol)
Security kernel
Fences
DHCP
39. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Boot-sector Virus
Closed network
Biometrics
SSH
40. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.
Keystroke logging
Transposition
Phreaker
SSO (Single sign-on)
41. A gas used in fire suppression. Not human safe. Chemical reaction.
Digital signing
Bugtraq
SYN Flood
Halon
42. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Fire extinguisher
Echelon
Certification
Firewall types
43. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Fences
ALE (Annualized Loss Expectancy)
Stream cipher
Transposition
44. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
SSL/TLS
Entrapment
CIO
Base-64
45. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
SYN Flood
Risk Transferring
Clipping levels
Embezzlement
46. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Risk Mitigation
WTLS (Wireless Transport Layer Security)
CHAP
Due Care
47. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Tokens
Virtual machine
Noise & perturbation
Halon
48. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Crosstalk
Trap Door
Decentralized
Software
49. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Motion detector
Compiler
Copyright
Warm Site
50. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Wiretapping
Risk Management
Well-known ports
Rolling hot sites