SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Clipper Chip
TCB
Out of band
ActiveX Object Linking and Embedding
2. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
SSH
Repeaters
Digest
Aggregation
3. The intercepting of conversations by unintended recipients
CGI (The Common Gateway Interface)
Common criteria
COOP
Eavesdropping
4. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Active attacks
Aggregation
Senior Management
Rijndael
5. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Birthday attack
WTLS (Wireless Transport Layer Security)
TCB
Honey pot
6. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Nonce
Dumpster diving
Degausser
TCSEC
7. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
Replay
Kerberos
Compiler
Virtual machine
8. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Script kiddies
Senior Management
Schema
Risk Management
9. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
TCB
Hash
Carnivore
Script kiddies
10. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Stream cipher
Motion detector
Authorization
User
11. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Joke
Keystroke logging
ALE (Annualized Loss Expectancy)
Service packs
12. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Script kiddies
Encryption
Software development lifecycle
Expert systems
13. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Virtual Memory/Pagefile.sys
Encryption
Vulnerability analysis tools
WAP (Wireless Application Protocol)
14. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Smurf
Security kernel
Trojan horses
Hoax
15. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Rolling hot sites
Debug
Hearsay Evidence
ROM (Read-only memory)
16. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Encryption
Rolling hot sites
Certification
Authentication
17. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
CRC (Cyclic Redundancy Check)
Open network
Code of ethics
VPN (Virtual Private Network)
18. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Java
Bugtraq
CD-Rom
Biometric profile
19. Public Key Infrastructure
PKI
Risk Transferring
TEMPEST
Bastion hosts
20. Animals with teeth. Not as discriminate as guards
Throughput of a Biometric System
Dogs
Hash
Brewer-Nash model
21. Emanations from one wire coupling with another wire
Raid 0 - 1 - 3 - 5
Crosstalk
RADIUS (Remote authentication dial-in user service)
Compiler
22. Component Object Model.
Probing
COM
PAP (Password Authentication Protocol)
Clipping levels
23. Scanning the airwaves for radio transmissions
Format 7 times
Scanning
Toneloc
Firewall types
24. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Back door/ trap door/maintenance hook
Multitasking
Masquerade
Session Hijacking
25. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Data Mart
SYN Flood
Smart cards
Separation of duties
26. Entails planning and system actions to ensure that a project is following good quality management practices
Quality Assurance
Raid 0 - 1 - 3 - 5
Common criteria
NAT
27. A technique to eliminate data redundancy.
Artificial Neural Networks (ANN)
Normalization
War driving
BIA
28. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Trade Secret
Embezzlement
Service packs
CIA
29. CISSPs subscribe to a code of ethics for building up the security profession
Code of ethics
Symmetric
Termination procedures
Brute force
30. Random Number Base
Toneloc
RAM (Random-access memory)
Nonce
TCSEC
31. A network that mimics the brain
Artificial Neural Networks (ANN)
Aggregation
Honey pot
Encryption
32. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Callback Security/Call Forwarding
Dogs
Digest
Sabotage
33. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Compiler
Sabotage
Motion detector
CIA
34. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Inference
Cryptanalysis
Crosstalk
Noise & perturbation
35. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Risk Analysis
TCSEC
Illegal/Unethical
Rolling hot sites
36. The frequency with which a threat is expected to occur.
Tokens
ARO (Annualized Rate of Occurrence)
ISDN (Integrated Services Digital Network)
Exit interview
37. Assuming someone's session who is unaware of what you are doing
Cookies
Clipper Chip
Accreditation
Session Hijacking
38. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
DNS cache poisoning
Finger scanning
DDOS
Polymorphism
39. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
CD-Rom
Bugtraq
SESAME
Repeaters
40. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
Qualitative
CD-Rom
TCP Wrappers
41. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Risk Analysis
War driving
Enticement
IRC
42. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Patriot Act
Logic bomb
Entrapment
Well-known ports
43. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
AES (Advanced Encryption Standard)
Throughput of a Biometric System
Incentive programs
Separation of duties
44. Confidentiality - Integrity - and Availability
Twisted pair
Rijndael
CIA
/etc/passwd
45. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Penetration testing
Digest
Patriot Act
Key Escrow
46. Someone whose hacking is primarily targeted at the phone systems
Username/password
Phreaker
Tort
FAR/FRR/CER
47. When security is managed at a central point in an organization
Security Awareness Training
Smart cards
Service packs
Centralized
48. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Dogs
TACACS (Terminal access controller access control system)
Joke
Entrapment
49. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Owner
Digest
IRC
Fire extinguisher
50. Distributed Component Object Model. Microsoft's implementation of CORBA.
CIRT
DCOM
Probing
Warm Site
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests