SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Reasonable doubt
User
Custodian
Burden of Proof
Hackers
2. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Software development lifecycle
Base-64
Polymorphism
Encryption
3. The real cost of acquiring/maintaining/developing a system
Asset Value
Scanning
Compiler
MOM
4. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Fraggle
Multithreading
Tokens
CIO
5. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
ARP (Address Resolution Protocol)
Mandatory vacation
Hardware
Risk Transferring
6. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
Script
TACACS (Terminal access controller access control system)
Security Perimeter
7. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Fraud
Brute force
FAR/FRR/CER
Security Awareness Training
8. The frequency with which a threat is expected to occur.
Dumpster diving
Penetration testing
TACACS (Terminal access controller access control system)
ARO (Annualized Rate of Occurrence)
9. A network that uses proprietary protocols
Closed network
Malware
Salami Slicing
Masquerade
10. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
Honey pot
Embezzlement
ActiveX Object Linking and Embedding
PKI
11. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Patent
Active attacks
Out of band
TCB
12. Internet Architecture Board. This board is responsible for protecting the Internet.
Certification
Hacker
Nonce
IAB
13. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
War dialing
Back door/ trap door/maintenance hook
Brute Force
Motion detector
14. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Masquerade
Asset Value
Warm Site
Brewer-Nash model
15. Software designed to infiltrate or damage a computer system - without the owner's consent.
Malware
Salami Slicing
Masquerade
Penetration testing
16. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
ALE (Annualized Loss Expectancy)
Biometrics
Java
Smurf
17. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Polymorphism
DNS cache poisoning
Dictionary Attack
Object Oriented Programming
18. Public Key Infrastructure
Quantitative
DNS cache poisoning
PKI
DMZ
19. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Termination procedures
Security Perimeter
FAR/FRR/CER
DHCP
20. Transferring your risk to someone else - typically an insurance company
Risk Transferring
Throughput of a Biometric System
Hubs
Accreditation
21. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
Digital certificates
Incentive programs
MOM
22. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Format 7 times
Attenuation
Cyphertext only
Digest
23. Dynamic Host Configuration Protocol.
SESAME
Sabotage
DHCP
Dumpster diving
24. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Boot-sector Virus
Active attacks
Compiler
Fences
25. Disclosure - Alteration - Destruction. These things break the CIA triad
DAD
Non-repudiation
Call tree
MitM
26. Must be in place for you to use a biometric system
Substitution
COOP
Brute force
Biometric profile
27. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Raid 0 - 1 - 3 - 5
Burden of Proof
Owner
ActiveX Object Linking and Embedding
28. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Service packs
Substitution
Joke
Detective - Preventive - Corrective
29. Using ICMP to diagram a network
Fraud
MOM
Probing
Schema
30. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Sabotage
Well-known ports
TCB
Authorization
31. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Sabotage
Hot Site
Brewer-Nash model
UUEncode
32. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Well-known ports
Boot-sector Virus
Closed network
Hubs
33. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Well-known ports
Cryptanalysis
Centralized
Teardrop
34. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
OSI Model
Private Addressing
Patriot Act
IAB
35. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Debug
Macro
Brewer-Nash model
Security through obscurity
36. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Java
TCP Wrappers
Skipjack
Object Oriented Programming
37. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Exit interview
l0pht
Buffer overflow
Honey pot
38. Involving the measurement of quantity or amount.
DDOS
War driving
Smart cards
Quantitative
39. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Buffer overflow
Cookies
Phreaker
Man trap
40. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
CCTV
PAP (Password Authentication Protocol)
Fraud
Illegal/Unethical
41. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Hacker
PKI
Reciprocal agreement
Hash
42. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Illegal/Unethical
Security kernel
Fraud
Brute force
43. A sandbox. Emulates an operating environment.
VLANs
Expert System
Virtual machine
Security Awareness Training
44. Chief Executive Officer
Well-known ports
Toneloc
CEO
Base-64
45. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Throughput of a Biometric System
Man trap
Clipper Chip
Open network
46. An instance of a scripting language
Twisted pair
Script
Data remanence
Out of band
47. Setting up the user to access the honeypot for reasons other than the intent to harm.
Aggregation
Authentication
Raid 0 - 1 - 3 - 5
Entrapment
48. CISSPs subscribe to a code of ethics for building up the security profession
CGI (The Common Gateway Interface)
TCB
Format 7 times
Code of ethics
49. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
TCB
Tokens
Base-64
IAB
50. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Hardware
Hacker
Copyright
Cookies
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests