SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Expert System
Multipartite
Job rotation
War driving
2. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Senior Management
DDOS
Toneloc
CD-Rom
3. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
SSL/TLS
Attenuation
Diffie-Hellman
Firmware
4. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Quantitative
Cyphertext only
Tokens
Closed network
5. Accepting all packets
Out of band
Granularity
Classes of IP networks
Promiscuous mode
6. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Classes of IP networks
IRC
Termination procedures
Incentive programs
7. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
Scanning
DDOS
Masquerade
Debug
8. Confidentiality - Integrity - and Availability
Termination procedures
Joke
CIA
Senior Management
9. These can be used to verify that public keys belong to certain individuals.
Tort
Service packs
Digital certificates
Hackers
10. Signal degradation as it moves farther from its source
Software
Scanning
Attenuation
Keystroke logging
11. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Software
CD-Rom
Packet Sniffing
l0pht
12. Dynamic Host Configuration Protocol.
IAB
DHCP
Polymorphic
Halon
13. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Fraggle
OEP
Technical - Administrative - Physical
Smart cards
14. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Risk Acceptance
Encryption
Security kernel
Fraggle
15. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Polymorphic
Clipper Chip
Digital certificates
Multithreading
16. Threat to physical security.
Sabotage
Polymorphic
CHAP
Trap Door
17. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
COOP
Accreditation
Logic bomb
Teardrop
18. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
Fiber optic
DMZ
Out of band
Honey pot
19. A network entity that provides a single entrance / exit point to the Internet.
Bastion hosts
Fire extinguisher
Closed network
Software librarian
20. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Risk Transferring
Trademark
User
CD-Rom
21. In a separation of duties model - this is where code is checked in and out
Termination procedures
CD-Rom
Base-64
Software librarian
22. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Checksum
Audit Trail
Toneloc
Tokens
23. Also known as a tunnel)
Biometrics
CEO
Trap Door
VPN (Virtual Private Network)
24. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Smart cards
/etc/passwd
CIRT
TEMPEST
25. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
FAR/FRR/CER
Closed network
Polymorphism
Security Awareness Training
26. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Checksum
SYN Flood
Echelon
Mandatory vacation
27. Network Address Translation
Telnet
NAT
Multithreading
War dialing
28. When one key of a two-key pair has more encryption pattern than the other
Asymmetric
Finger printing
OSI Model
Sabotage
29. Chief Executive Officer
VLANs
CIA
Copyright
CEO
30. Transferring your risk to someone else - typically an insurance company
Firmware
Risk Transferring
Burden of Proof
Authorization
31. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
ARP (Address Resolution Protocol)
WAP (Wireless Application Protocol)
Probing
Decentralized
32. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Private Addressing
Risk Analysis
Active attacks
Polymorphism
33. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Content dependant
Script kiddies
Cyphertext only
Honey pot
34. Assuming someone's session who is unaware of what you are doing
Masquerade
Session Hijacking
Incentive programs
Salami Slicing
35. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Scanning
Hardware
Incentive programs
Brute force
36. Defines the objects and their attributes that exist in a database.
Schema
TCSEC
Script kiddies
War dialing
37. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Birthday attack
Risk Transferring
Entrapment
Skipjack
38. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
SYN Flood
Burden of Proof
Firmware
Certification
39. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Aggregation
Private Addressing
Repeaters
Risk Acceptance
40. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
Detective - Preventive - Corrective
Artificial Neural Networks (ANN)
OSI Model
41. These viruses usually infect both boot records and files.
Compiler
ROT-13
Multipartite
Virtual machine
42. Rolling command center with UPS - satellite - uplink - power - etc.
MOM
Software development lifecycle
Hearsay Evidence
Rolling hot sites
43. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
Base-64
Well-known ports
Raid 0 - 1 - 3 - 5
ISDN (Integrated Services Digital Network)
44. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
SSH
Biometrics
Asset Value
Joke
45. A network that uses standard protocols (TCP/IP)
Open network
Brute force
COOP
Software
46. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
Call tree
Polymorphic
Cold Site
47. A sandbox. Emulates an operating environment.
Classes of IP networks
Risk Management
VPN (Virtual Private Network)
Virtual machine
48. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
EF (Exposure Factor)
SSL/TLS
CGI (The Common Gateway Interface)
Private Addressing
49. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
/etc/passwd
Rolling hot sites
Trademark
Callback Security/Call Forwarding
50. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Audit Trail
Degausser
Substitution
CEO
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests