SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Quality Assurance
Checksum
COM
Risk Acceptance
2. A site that is ready physically but has no hardware in place - all it has is HVAC
Macro
Cold Site
Script kiddies
DOS
3. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Aggregation
Username/password
Salami Slicing
Dictionary Attack
4. A network that uses proprietary protocols
Hot Site
ActiveX Object Linking and Embedding
Probing
Closed network
5. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Bastion hosts
War driving
ALE (Annualized Loss Expectancy)
Kerberos
6. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Hoax
SQL (Structured Query Language)
Probing
Biometrics
7. The intercepting of conversations by unintended recipients
Data remanence
Eavesdropping
Qualitative
Patriot Act
8. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Java
Data remanence
Teardrop
Termination procedures
9. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Multitasking
Senior Management
Private Addressing
Teardrop
10. Common Object Request Broker Architecture.
Diffie-Hellman
CORBA
PAP (Password Authentication Protocol)
SESAME
11. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Hoax
Script kiddies
Software
Closed network
12. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Format 7 times
Degausser
Risk Acceptance
Hoax
13. Reasonable doubt
Format 7 times
Switches / Bridges
Hot Site
Burden of Proof
14. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Social engineering
Honey pot
Out of band
Embezzlement
15. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Trap Door
Halon
Degausser
Job rotation
16. Someone who hacks
Vulnerability analysis tools
Hacker
Open network
Virtual machine
17. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Privacy Act of 1974
BIOS
Multitasking
Sabotage
18. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Closed network
Malware
Security Perimeter
Hash
19. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Open network
ISDN (Integrated Services Digital Network)
Trade Secret
Trademark
20. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Keystroke logging
Firmware
DDOS
Logic bomb
21. Someone whose hacking is primarily targeted at the phone systems
Multithreading
Noise & perturbation
Trap Door
Phreaker
22. Setting up the user to access the honeypot for reasons other than the intent to harm.
Virtual Memory/Pagefile.sys
Data Mart
Entrapment
Exit interview
23. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Identification
Birthday attack
PKI
War driving
24. An instance of a scripting language
Brute force
Script
SSH
Due Care
25. A hidden communications channel on a system that allows for the bypassing of the system security policy
Telnet
/etc/passwd
Covert channels
Incentive programs
26. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
TACACS (Terminal access controller access control system)
Format 7 times
Substitution
COM
27. The person that controls access to the data
Burden of Proof
DHCP
Custodian
SSO (Single sign-on)
28. In a separation of duties model - this is where code is checked in and out
Routers
Quantitative
Software librarian
Identification
29. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Software development lifecycle
Masquerade
Call tree
Format 7 times
30. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
Telnet
ARP (Address Resolution Protocol)
Incentive programs
l0pht
31. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
BIOS
Spoofing
Honey pot
Finger printing
32. Defines the objects and their attributes that exist in a database.
MOM
Clipper Chip
Schema
CHAP
33. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Fraud
Termination procedures
Code of ethics
Risk Analysis
34. To not be legal (as far as law is concerned) or ethical
Trojan horses
Illegal/Unethical
DHCP
Burden of Proof
35. 'If you cant see it - its secure'. Bad policy to live by.
Data remanence
Social engineering
Security through obscurity
Termination procedures
36. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Software
Session Hijacking
Audit Trail
/etc/passwd
37. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Substitution
Granularity
Joke
Telnet
38. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
Encryption
Service packs
Eavesdropping
Hardware
39. A war dialing utility
VPN (Virtual Private Network)
Toneloc
PAP (Password Authentication Protocol)
Incentive programs
40. A sandbox. Emulates an operating environment.
Reciprocal agreement
BIA
Virtual machine
Multipartite
41. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Mandatory vacation
Motion detector
OSI Model
Warm Site
42. Continuation of Operations Plan
COOP
Decentralized
Audit Trail
Hearsay Evidence
43. Public Key Infrastructure
Session Hijacking
ISDN (Integrated Services Digital Network)
PKI
Phreaker
44. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Brute force
Symmetric
VLANs
CRC (Cyclic Redundancy Check)
45. Repeats the signal. It amplifies the signal before sending it on.
AES (Advanced Encryption Standard)
Joke
WTLS (Wireless Transport Layer Security)
Repeaters
46. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Trade Secret
Security Perimeter
Clipping levels
Hash
47. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Trojan horses
VLANs
CCTV
Finger scanning
48. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Biometrics
IAB
Diffie-Hellman
War dialing
49. The frequency with which a threat is expected to occur.
Phreaker
ARO (Annualized Rate of Occurrence)
Firmware
Probing
50. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Logic bomb
Incentive programs
Symmetric
Dogs
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests