SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
Attenuation
ROT-13
Granularity
Out of band
2. Distributed Component Object Model. Microsoft's implementation of CORBA.
AES (Advanced Encryption Standard)
Patent
DCOM
TCB
3. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Debug
Echelon
Virtual machine
Non-repudiation
4. Object Linking and Embedding. The ability of an object to be embedded into another object.
Qualitative
Hardware
OLE
Digest
5. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Hearsay Evidence
Covert channels
Software librarian
Aggregation
6. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Illegal/Unethical
Common criteria
Tailgating / Piggybacking
SSO (Single sign-on)
7. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Raid 0 - 1 - 3 - 5
IRC
SLE (Single Loss Expectancy or Exposure)
DAD
8. Chief Executive Officer
WAP (Wireless Application Protocol)
CEO
Due Diligence
SLE (Single Loss Expectancy or Exposure)
9. Method of authenticating to a system. Something that you supply and something you know.
Username/password
Call tree
Privacy Act of 1974
NAT
10. An instance of a scripting language
Script
Substitution
TCP Wrappers
CCTV
11. Software designed to infiltrate or damage a computer system - without the owner's consent.
ROM (Read-only memory)
Bastion hosts
Malware
Skipjack
12. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Phreaker
Bastion hosts
Motion detector
Open network
13. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
Embezzlement
Clipper Chip
Probing
14. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Biometrics
Kerberos
SYN Flood
CIA
15. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Penetration testing
Virtual machine
Job rotation
Man trap
16. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Wiretapping
User
Patent
Macro
17. Access control method for database based on the content of the database to provide granular access
Social engineering
Content dependant
AES (Advanced Encryption Standard)
Patriot Act
18. Network devices that operate at layer 3. This device separates broadcast domains.
l0pht
SESAME
Authentication
Routers
19. When two or more processes are linked and execute multiple programs simultaneously
Code of ethics
Patent
TACACS (Terminal access controller access control system)
Multiprocessing
20. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Trade Secret
Data Mart
SSO (Single sign-on)
PKI
21. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
CIA
Transposition
Hearsay Evidence
Privacy Act of 1974
22. Internet Architecture Board. This board is responsible for protecting the Internet.
IAB
CIRT
BIA
Hoax
23. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
Cyphertext only
Privacy Act of 1974
Call tree
DDOS
24. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Smart cards
Kerberos
Joke
Cryptanalysis
25. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
TCB
Security Perimeter
War driving
Normalization
26. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Call tree
Out of band
Guards
Patriot Act
27. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Security Awareness Training
DNS cache poisoning
Vulnerability analysis tools
Open network
28. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Macro
Buffer overflow
CIRT
Security Awareness Training
29. Basic Input/Output System
Checksum
BIOS
Firmware
Embezzlement
30. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Aggregation
Tokens
ARO (Annualized Rate of Occurrence)
Security Awareness Training
31. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Software
Expert System
Checksum
DDOS
32. Also civil law
Nonce
Dictionary Attack
Malware
Tort
33. Enticing people to hit your honeypot to see how they try to access your system.
Enticement
Bastion hosts
Session Hijacking
SYN Flood
34. These viruses usually infect both boot records and files.
DCOM
Java
Multipartite
Fraud
35. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Masquerade
SLE (Single Loss Expectancy or Exposure)
SYN Flood
VPN (Virtual Private Network)
36. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Cyphertext only
Hearsay Evidence
Dogs
Noise & perturbation
37. This is an open international standard for applications that use wireless communications.
WAP (Wireless Application Protocol)
Digital certificates
Burden of Proof
Session Hijacking
38. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Tort
Social engineering
Fraggle
Transposition
39. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Privacy Act of 1974
Expert System
CGI (The Common Gateway Interface)
Throughput of a Biometric System
40. Continuation of Operations Plan
Qualitative
Biometric profile
COOP
CCTV
41. A network entity that provides a single entrance / exit point to the Internet.
Asset Value
Privacy Act of 1974
Bastion hosts
Degausser
42. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
PKI
Code of ethics
War dialing
Salami Slicing
43. Dialing fixed sets telephone numbers looking for open modem connections to machines
Cryptanalysis
Covert channels
Debug
War dialing
44. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Packet Sniffing
Two-Factor Authentication
Checksum
PAP (Password Authentication Protocol)
45. A site that has some equipment in place - and can be up within days
User
Security Awareness Training
Warm Site
Separation of duties
46. In cryptography - it is a block cipher
DHCP
Accreditation
Skipjack
ROT-13
47. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Hearsay Evidence
SLE (Single Loss Expectancy or Exposure)
Termination procedures
VLANs
48. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Risk Management
MitM
Virtual Memory/Pagefile.sys
ROT-13
49. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Multiprocessing
AES (Advanced Encryption Standard)
Hash
SLE (Single Loss Expectancy or Exposure)
50. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Rijndael
SSL/TLS
Code of ethics
DMZ