SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The frequency with which a threat is expected to occur.
Hackers
Burden of Proof
ARO (Annualized Rate of Occurrence)
Bastion hosts
2. Using ICMP to diagram a network
PKI
WAP (Wireless Application Protocol)
Brute Force
Probing
3. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
DOS
Hackers
IRC
Patriot Act
4. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Raid 0 - 1 - 3 - 5
Inference
Brewer-Nash model
Cold Site
5. Entails planning and system actions to ensure that a project is following good quality management practices
VPN (Virtual Private Network)
Custodian
Quality Assurance
Hubs
6. Be at least 8 foot tall and have three strands of barbed wire.
Rolling hot sites
Fences
Packet Sniffing
/etc/passwd
7. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Degausser
Scanning
Java
Embezzlement
8. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Logic bomb
Enticement
Penetration testing
Masquerade
9. Something used to put out a fire. Can be in Classes A - B - C - D - or H
TCP Wrappers
Fire extinguisher
Finger printing
Private Addressing
10. Emanations from one wire coupling with another wire
Crosstalk
OLE
Incentive programs
Macro
11. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Trade Secret
TEMPEST
Expert System
Teardrop
12. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Trademark
Senior Management
Authorization creep
Embezzlement
13. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Cryptanalysis
Fiber optic
Active attacks
ROM (Read-only memory)
14. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
CCTV
WAP (Wireless Application Protocol)
Trojan horses
15. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Hoax
Vulnerability analysis tools
Due Care
Teardrop
16. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Inference
IAB
Acceptable use
Echelon
17. Internet Relay Chat.
IRC
Sniffing
Dumpster diving
Eavesdropping
18. Enticing people to hit your honeypot to see how they try to access your system.
Polymorphic
TCSEC
Identification
Enticement
19. Object Linking and Embedding. The ability of an object to be embedded into another object.
CD-Rom
Closed network
Expert System
OLE
20. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Telnet
Identification
Script kiddies
Authorization
21. This is an open international standard for applications that use wireless communications.
Format 7 times
WAP (Wireless Application Protocol)
Switches / Bridges
Custodian
22. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
ROT-13
DMZ
Security Perimeter
Digest
23. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Kerberos
Asset Value
Bugtraq
Routers
24. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Common criteria
Trojan horses
Data remanence
Authentication
25. Common Object Request Broker Architecture.
Probing
Rijndael
CORBA
CIRT
26. Chief Executive Officer
Closed network
CEO
Nonce
User
27. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
War driving
Cyphertext only
Passive attacks
Brewer-Nash model
28. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Software development lifecycle
Acceptable use
Schema
Guards
29. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
UUEncode
Hearsay Evidence
Dictionary Attack
Birthday attack
30. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Finger scanning
Data remanence
Digital signing
Inference
31. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
l0pht
Spoofing
CIO
Entrapment
32. Threat to physical security.
Packet Sniffing
CHAP
PAP (Password Authentication Protocol)
Sabotage
33. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
SSO (Single sign-on)
PKI
Crosstalk
SESAME
34. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Senior Management
CHAP
Brute Force
Back door/ trap door/maintenance hook
35. White hat l0pht
Bugtraq
Virtual machine
Brewer-Nash model
Macro
36. The output of a hash function is a digest.
Firmware
Embezzlement
TACACS (Terminal access controller access control system)
Digest
37. When security is managed at a central point in an organization
Macro
Centralized
Noise & perturbation
Joke
38. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Packet Sniffing
Quantitative
Twisted pair
Call tree
39. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Risk Acceptance
ARO (Annualized Rate of Occurrence)
Bugtraq
ARP (Address Resolution Protocol)
40. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s
Encryption
Diffie-Hellman
Hash
Rijndael
41. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Toneloc
Dogs
Encryption
Data remanence
42. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Transposition
Risk Analysis
Termination procedures
DOS
43. A network that mimics the brain
Digital certificates
War dialing
Artificial Neural Networks (ANN)
Social engineering
44. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Brute Force
Multithreading
Packet Sniffing
Format 7 times
45. Data storage formats and equipment that allow the stored data to be accessed in any order
RAM (Random-access memory)
Entrapment
Fraud
TEMPEST
46. The art of breaking code. Testing the strength of an algorithm.
Skipjack
Cryptanalysis
Service packs
Hubs
47. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Expert System
PKI
Security Awareness Training
Security through obscurity
48. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Biometric profile
Macro
Closed network
Embezzlement
49. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Dogs
Hash
DDOS
Digital signing
50. Dynamic Host Configuration Protocol.
Nonce
Skipjack
DHCP
Script
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests