SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Confidentiality - Integrity - and Availability
Attenuation
CIA
Spoofing
Senior Management
2. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Patriot Act
/etc/passwd
Classes of IP networks
RADIUS (Remote authentication dial-in user service)
3. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Base-64
ROM (Read-only memory)
Fraud
Multipartite
4. Network device that operates at layer 1. Concentrator.
Software development lifecycle
Hubs
VPN (Virtual Private Network)
OLE
5. A network that uses standard protocols (TCP/IP)
Open network
Twisted pair
Birthday attack
Virtual machine
6. The user
Hubs
Fraud
Digest
User
7. Encompasses Risk Analysis and Risk Mitigation
Quality Assurance
DMZ
Risk Management
Code of ethics
8. Internet Architecture Board. This board is responsible for protecting the Internet.
Session Hijacking
IAB
PKI
Digital signing
9. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
COM
Trademark
MitM
Privacy Act of 1974
10. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Tort
Fire extinguisher
Clipper Chip
Security Awareness Training
11. An instance of a scripting language
Script
Kerberos
Multitasking
Polymorphism
12. Enticing people to hit your honeypot to see how they try to access your system.
Callback Security/Call Forwarding
Enticement
Firmware
Detective - Preventive - Corrective
13. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Birthday attack
TCSEC
Attenuation
SSO (Single sign-on)
14. Making individuals accountable for their actions on a system typically through the use of auditing
Enticement
Accountability
ARO (Annualized Rate of Occurrence)
Data Mart
15. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Man trap
Dictionary Attack
Callback Security/Call Forwarding
Illegal/Unethical
16. Repeats the signal. It amplifies the signal before sending it on.
Risk Mitigation
CIRT
Worm
Repeaters
17. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
BIOS
Virtual machine
Digital signing
COM
18. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Security Awareness Training
Back door/ trap door/maintenance hook
Virtual machine
l0pht
19. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Fiber optic
Buffer overflow
Toneloc
PAP (Password Authentication Protocol)
20. Jumping into dumpsters to retrieve information about someone/something/a company
Throughput of a Biometric System
Dumpster diving
Salami Slicing
DMZ
21. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Dogs
Expert System
DDOS
Non-repudiation
22. Public Key Infrastructure
PKI
Raid 0 - 1 - 3 - 5
Private Addressing
Carnivore
23. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Owner
Detective - Preventive - Corrective
Raid 0 - 1 - 3 - 5
Telnet
24. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Toneloc
Caesar Cipher
MitM
Tailgating / Piggybacking
25. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Custodian
Packet Sniffing
Polymorphism
SESAME
26. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
DMZ
Boot-sector Virus
PKI
Brute force
27. Computer Incident Response Team
Senior Management
CIRT
DCOM
Fences
28. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Routers
Man trap
Multithreading
Well-known ports
29. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Finger printing
Man trap
Biometric profile
Polymorphism
30. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Switches / Bridges
Logic bomb
NAT
Aggregation
31. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Honey pot
Spoofing
Tort
Hacker
32. A network that uses proprietary protocols
Trademark
Rolling hot sites
Closed network
Promiscuous mode
33. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
WTLS (Wireless Transport Layer Security)
SLE (Single Loss Expectancy or Exposure)
SSL/TLS
RADIUS (Remote authentication dial-in user service)
34. Using ICMP to diagram a network
Attenuation
Call tree
Privacy Act of 1974
Probing
35. A site that has some equipment in place - and can be up within days
Technical - Administrative - Physical
Content dependant
Warm Site
Motion detector
36. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
IRC
Passive attacks
Dumpster diving
FAR/FRR/CER
37. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Base-64
Nonce
COM
Back door/ trap door/maintenance hook
38. Data storage formats and equipment that allow the stored data to be accessed in any order
RAM (Random-access memory)
Trademark
Owner
Tokens
39. Transferring your risk to someone else - typically an insurance company
ALE (Annualized Loss Expectancy)
Risk Transferring
VLANs
Malware
40. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Enticement
Due Diligence
Authorization creep
Telnet
41. Accepting all packets
IAB
Callback Security/Call Forwarding
Promiscuous mode
Digital signing
42. A technique to eliminate data redundancy.
Audit Trail
Hackers
User
Normalization
43. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Key Escrow
Brute force
Centralized
Macro
44. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Java
Patent
Decentralized
Polymorphism
45. Threat to physical security.
Sabotage
Keystroke logging
Transposition
Closed network
46. Motive - Opportunity - and Means. These deal with crime.
MOM
Call tree
Software
PAP (Password Authentication Protocol)
47. Motivational tools for employee awareness to get them to report security flaws in an organization
Expert System
Authorization creep
Incentive programs
RADIUS (Remote authentication dial-in user service)
48. Occupant Emergency Plan - Employees are the most important!
Attenuation
Teardrop
Dictionary Attack
OEP
49. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Tort
Tokens
Cookies
ROT-13
50. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
ARP (Address Resolution Protocol)
Decentralized
Brute force
ActiveX Object Linking and Embedding
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests