SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The person that determines the permissions to files. The data owner.
Birthday attack
DNS cache poisoning
Owner
Caesar Cipher
2. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Fences
Acceptable use
Trade Secret
Worm
3. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Multitasking
CRC (Cyclic Redundancy Check)
ISDN (Integrated Services Digital Network)
Artificial Neural Networks (ANN)
4. Someone who hacks
User
Scanning
COM
Hacker
5. Animals with teeth. Not as discriminate as guards
DHCP
Dogs
CORBA
Expert System
6. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Certification
Cold Site
Rijndael
Debug
7. Rolling command center with UPS - satellite - uplink - power - etc.
CHAP
Fences
Patriot Act
Rolling hot sites
8. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
CIRT
Block cipher
CGI (The Common Gateway Interface)
Degausser
9. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
Technical - Administrative - Physical
War driving
RADIUS (Remote authentication dial-in user service)
Substitution
10. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Dictionary Attack
Aggregation
Caesar Cipher
SQL (Structured Query Language)
11. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Birthday attack
Exit interview
Quality Assurance
Echelon
12. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
Brute Force
l0pht
Well-known ports
Technical - Administrative - Physical
13. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Halon
Encryption
WAP (Wireless Application Protocol)
Eavesdropping
14. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Firewall types
OSI Model
Embezzlement
Firmware
15. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Twisted pair
Echelon
Honey pot
Entrapment
16. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Guards
SSH
CD-Rom
Halon
17. A site that is ready physically but has no hardware in place - all it has is HVAC
Smurf
Qualitative
Cold Site
Replay
18. Basic Input/Output System
Birthday attack
BIOS
Cold Site
DCOM
19. A network that mimics the brain
Accreditation
Artificial Neural Networks (ANN)
Digital certificates
Multithreading
20. Dialing fixed sets telephone numbers looking for open modem connections to machines
IAB
Tokens
ActiveX Object Linking and Embedding
War dialing
21. Internet Relay Chat.
SQL (Structured Query Language)
IRC
Software librarian
Sniffing
22. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
VPN (Virtual Private Network)
UUEncode
Stream cipher
Kerberos
23. Same as a block cipher except that it is applied to a data stream one bit at a time
Security Awareness Training
Fences
Qualitative
Stream cipher
24. Also civil law
War driving
War dialing
Tort
ARO (Annualized Rate of Occurrence)
25. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
CIA
Normalization
FAR/FRR/CER
Hardware
26. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Normalization
Copyright
Reciprocal agreement
TEMPEST
27. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Change management
SSH
Trap Door
Security Perimeter
28. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
OSI Model
Symmetric
PAP (Password Authentication Protocol)
Cryptanalysis
29. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
CIRT
Expert System
PKI
Security through obscurity
30. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
Hacker
Biometrics
Hoax
Service packs
31. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
COOP
Hackers
Birthday attack
CORBA
32. Software designed to infiltrate or damage a computer system - without the owner's consent.
Sniffing
Switches / Bridges
Malware
Scanning
33. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Patriot Act
Fences
Teardrop
SSH
34. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Artificial Neural Networks (ANN)
Accreditation
Software librarian
Acceptable use
35. Threat to physical security.
Toneloc
Trademark
RAM (Random-access memory)
Sabotage
36. A mechanism by which connections to TCP services on a system are allowed or disallowed
TCP Wrappers
CIO
OSI Model
Halon
37. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Private Addressing
Risk Acceptance
PAP (Password Authentication Protocol)
MitM
38. To not be legal (as far as law is concerned) or ethical
Schema
Security Perimeter
Illegal/Unethical
Termination procedures
39. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Spoofing
Masquerade
Degausser
Nonce
40. Good for distance - longer than 100M
Coax
Rolling hot sites
Detective - Preventive - Corrective
Carnivore
41. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Incentive programs
Promiscuous mode
ALE (Annualized Loss Expectancy)
Format 7 times
42. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Patent
Object Oriented Programming
Replay
Motion detector
43. Network devices that operate at layer 3. This device separates broadcast domains.
Cyphertext only
Routers
Java
CGI (The Common Gateway Interface)
44. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Security Perimeter
Masquerade
ROT-13
Callback Security/Call Forwarding
45. The process of reducing your risks to an acceptable level based on your risk analysis
Hearsay Evidence
Risk Mitigation
Symmetric
Encryption
46. Repeats the signal. It amplifies the signal before sending it on.
Degausser
Key Escrow
Smurf
Repeaters
47. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Reciprocal agreement
DNS cache poisoning
Risk Analysis
RAM (Random-access memory)
48. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Transposition
Trade Secret
Software development lifecycle
OLE
49. Be at least 8 foot tall and have three strands of barbed wire.
Fences
Honey pot
Data remanence
Common criteria
50. A system designed to stop piggybacking.
Man trap
Crosstalk
Illegal/Unethical
FAR/FRR/CER