SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Also known as a tunnel)
SSH
Keystroke logging
War dialing
VPN (Virtual Private Network)
2. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Block cipher
Fences
Clipper Chip
DDOS
3. Network devices that operate at layer 3. This device separates broadcast domains.
Service packs
MOM
Virtual Memory/Pagefile.sys
Routers
4. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
Trap Door
EF (Exposure Factor)
SSO (Single sign-on)
Clipping levels
5. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Smurf
Out of band
Hackers
Risk Mitigation
6. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
PAP (Password Authentication Protocol)
Burden of Proof
Polymorphic
Back door/ trap door/maintenance hook
7. Assuming someone's session who is unaware of what you are doing
Session Hijacking
Rijndael
Security kernel
Well-known ports
8. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Hearsay Evidence
Packet Sniffing
Checksum
Wiretapping
9. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Toneloc
SSL/TLS
Termination procedures
Buffer overflow
10. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Two-Factor Authentication
Reciprocal agreement
Eavesdropping
Risk Analysis
11. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Macro
Malware
Software librarian
AES (Advanced Encryption Standard)
12. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Exit interview
Data Mart
Man trap
Multithreading
13. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Birthday attack
CORBA
Warm Site
CRC (Cyclic Redundancy Check)
14. Basic Input/Output System
Stream cipher
BIOS
WTLS (Wireless Transport Layer Security)
DHCP
15. A site that has some equipment in place - and can be up within days
Warm Site
Certification
Kerberos
Quality Assurance
16. More discriminate than dogs
Rolling hot sites
Guards
Noise & perturbation
Transposition
17. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Risk Mitigation
Encryption
Masquerade
Active attacks
18. The ability to have more than one thread associated with a process
Custodian
Authentication
Multithreading
Change management
19. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Compiler
Base-64
Brute Force
Classes of IP networks
20. Once authenticated - the level of access you have to a system
Authorization
BIOS
Expert systems
Embezzlement
21. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Risk Acceptance
Virtual Memory/Pagefile.sys
Tokens
Fraggle
22. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Data Mart
Scanning
VPN (Virtual Private Network)
AES (Advanced Encryption Standard)
23. Same as a block cipher except that it is applied to a data stream one bit at a time
Diffie-Hellman
Stream cipher
Hearsay Evidence
Key Escrow
24. Ethernet - Cat5 - Twisted to allow for longer runs.
Expert System
Data Mart
ARO (Annualized Rate of Occurrence)
Twisted pair
25. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Enticement
DDOS
Transposition
SYN Flood
26. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
Cold Site
CIO
CRC (Cyclic Redundancy Check)
Inference
27. A network that mimics the brain
Transposition
Trojan horses
MOM
Artificial Neural Networks (ANN)
28. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Authorization
CRC (Cyclic Redundancy Check)
Smurf
Biometrics
29. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Vulnerability analysis tools
Patriot Act
Digital certificates
Inference
30. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
TCP Wrappers
SSH
Firewall types
Degausser
31. Accepting all packets
Hackers
Promiscuous mode
Rolling hot sites
Change management
32. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
RADIUS (Remote authentication dial-in user service)
Promiscuous mode
ARO (Annualized Rate of Occurrence)
CD-Rom
33. White hat l0pht
Bugtraq
DNS cache poisoning
Decentralized
Risk Mitigation
34. Scanning the airwaves for radio transmissions
Digest
Scanning
Back door/ trap door/maintenance hook
Copyright
35. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Finger scanning
WTLS (Wireless Transport Layer Security)
Trade Secret
ALE (Annualized Loss Expectancy)
36. Confidentiality - Integrity - and Availability
CIA
Granularity
Worm
Schema
37. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Passive attacks
Hash
Rolling hot sites
Vulnerability analysis tools
38. Computer Incident Response Team
CCTV
Passive attacks
CIRT
Clipper Chip
39. Encompasses Risk Analysis and Risk Mitigation
Security kernel
Authorization creep
Risk Management
Halon
40. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
l0pht
TCP Wrappers
Biometric profile
Separation of duties
41. Common Object Request Broker Architecture.
Patriot Act
User
CORBA
Script kiddies
42. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Code of ethics
Throughput of a Biometric System
Technical - Administrative - Physical
Hubs
43. Chief Information Officer
Firewall types
DDOS
CIO
Nonce
44. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Cold Site
CIO
Virtual machine
Mandatory vacation
45. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
ROT-13
Quantitative
Base-64
DDOS
46. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Back door/ trap door/maintenance hook
Sabotage
RADIUS (Remote authentication dial-in user service)
Polymorphic
47. Internet Relay Chat.
Bastion hosts
Warm Site
Hackers
IRC
48. In cryptography - it is a block cipher
Skipjack
Polymorphic
Carnivore
Halon
49. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
PAP (Password Authentication Protocol)
Data remanence
Common criteria
Exit interview
50. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
ActiveX Object Linking and Embedding
Honey pot
Embezzlement
Dogs
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests