SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A site that has some equipment in place - and can be up within days
Expert System
Warm Site
Firewall types
ActiveX Object Linking and Embedding
2. The practice of obtaining confidential information by manipulation of legitimate users.
Encryption
Due Care
Custodian
Social engineering
3. CISSPs subscribe to a code of ethics for building up the security profession
Hardware
Code of ethics
Throughput of a Biometric System
Tokens
4. Public Key Infrastructure
DCOM
Firmware
Trap Door
PKI
5. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Risk Transferring
Expert System
Routers
Due Care
6. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Script
Key Escrow
Crosstalk
Clipper Chip
7. When security is managed at many different points in an organization
Base-64
DHCP
Decentralized
Firewall types
8. Internet Relay Chat.
Artificial Neural Networks (ANN)
IRC
Hash
Accountability
9. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Polymorphic
TACACS (Terminal access controller access control system)
TCSEC
Authorization
10. When two or more processes are linked and execute multiple programs simultaneously
Trap Door
Wiretapping
Multiprocessing
Software development lifecycle
11. Jumping into dumpsters to retrieve information about someone/something/a company
Well-known ports
Coax
Macro
Dumpster diving
12. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Multithreading
WTLS (Wireless Transport Layer Security)
Joke
SLE (Single Loss Expectancy or Exposure)
13. The real cost of acquiring/maintaining/developing a system
Guards
Replay
Asset Value
ActiveX Object Linking and Embedding
14. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Security through obscurity
DCOM
Birthday attack
Compiler
15. Network device that operates at layer 1. Concentrator.
Hubs
Patriot Act
Accreditation
Separation of duties
16. The user
Entrapment
Penetration testing
Keystroke logging
User
17. A war dialing utility
Privacy Act of 1974
Toneloc
Decentralized
SLE (Single Loss Expectancy or Exposure)
18. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Scanning
/etc/passwd
Multitasking
Man trap
19. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
TCSEC
Classes of IP networks
Carnivore
Artificial Neural Networks (ANN)
20. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Active attacks
ALE (Annualized Loss Expectancy)
Crosstalk
Sniffing
21. A military standard defining controls for emanation protection
Code of ethics
Brute force
Warm Site
TEMPEST
22. Rolling command center with UPS - satellite - uplink - power - etc.
Skipjack
FAR/FRR/CER
Rolling hot sites
Call tree
23. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
WTLS (Wireless Transport Layer Security)
Incentive programs
Risk Transferring
Carnivore
24. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
MOM
Multiprocessing
CHAP
Transposition
25. Dialing fixed sets telephone numbers looking for open modem connections to machines
Schema
War dialing
VLANs
Detective - Preventive - Corrective
26. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Transposition
Separation of duties
Trap Door
Software development lifecycle
27. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Aggregation
COM
Bastion hosts
Motion detector
28. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
SQL (Structured Query Language)
Honey pot
Non-repudiation
ALE (Annualized Loss Expectancy)
29. Relating to quality or kind. This assigns a level of importance to something.
DAD
Embezzlement
Qualitative
Non-repudiation
30. A system designed to stop piggybacking.
TEMPEST
Man trap
Session Hijacking
Trojan horses
31. Someone whose hacking is primarily targeted at the phone systems
Hearsay Evidence
Accountability
Biometrics
Phreaker
32. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
ROT-13
Virtual machine
Illegal/Unethical
Closed network
33. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Vulnerability analysis tools
MOM
Dictionary Attack
Virtual machine
34. A hidden communications channel on a system that allows for the bypassing of the system security policy
Finger scanning
Job rotation
Covert channels
Toneloc
35. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Senior Management
Smurf
Quality Assurance
NAT
36. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Hoax
Trademark
Warm Site
SSL/TLS
37. Using ICMP to diagram a network
TCB
Probing
Job rotation
Trojan horses
38. Signal degradation as it moves farther from its source
Enticement
Closed network
Attenuation
Noise & perturbation
39. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Incentive programs
Compiler
Brewer-Nash model
Hoax
40. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
FAR/FRR/CER
Cookies
Clipping levels
Degausser
41. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
PKI
Software librarian
Script
DOS
42. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Sabotage
AES (Advanced Encryption Standard)
OEP
Risk Mitigation
43. The frequency with which a threat is expected to occur.
Hubs
Software development lifecycle
ARO (Annualized Rate of Occurrence)
Rolling hot sites
44. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Mandatory vacation
FAR/FRR/CER
Out of band
Trademark
45. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Patent
TCSEC
Script kiddies
Hardware
46. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
CCTV
Accountability
Polymorphic
Wiretapping
47. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
Phreaker
Degausser
CCTV
48. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Fire extinguisher
Mandatory vacation
CCTV
Polymorphic
49. Continuation of Operations Plan
ROM (Read-only memory)
COOP
DDOS
Brewer-Nash model
50. Providing verification to a system
Authentication
Fences
VPN (Virtual Private Network)
Telnet
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests