SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A gas used in fire suppression. Not human safe. Chemical reaction.
Call tree
Halon
TCB
Artificial Neural Networks (ANN)
2. These viruses usually infect both boot records and files.
Dogs
Risk Mitigation
Trademark
Multipartite
3. Chief Information Officer
Substitution
Technical - Administrative - Physical
Fraud
CIO
4. Setting up the user to access the honeypot for reasons other than the intent to harm.
Brute force
Entrapment
Scanning
Telnet
5. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Fraud
DDOS
DHCP
Call tree
6. A network that mimics the brain
Artificial Neural Networks (ANN)
Compiler
SSO (Single sign-on)
War dialing
7. 'If you cant see it - its secure'. Bad policy to live by.
Virtual machine
Security through obscurity
Username/password
Expert systems
8. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Birthday attack
NAT
Security through obscurity
Block cipher
9. A network that uses proprietary protocols
Polymorphism
Closed network
VPN (Virtual Private Network)
Carnivore
10. Closed Circuit Television
Data Mart
Twisted pair
CCTV
Crosstalk
11. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
CIRT
Patent
Rolling hot sites
12. White hat l0pht
Bugtraq
Virtual Memory/Pagefile.sys
WAP (Wireless Application Protocol)
Masquerade
13. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
CD-Rom
ISDN (Integrated Services Digital Network)
Halon
Classes of IP networks
14. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
Hearsay Evidence
Transposition
Back door/ trap door/maintenance hook
15. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Finger scanning
Username/password
Callback Security/Call Forwarding
Hardware
16. Continuation of Operations Plan
Fiber optic
COOP
Transposition
Fences
17. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
/etc/passwd
Technical - Administrative - Physical
Hardware
18. Occupant Emergency Plan - Employees are the most important!
Dumpster diving
OEP
TEMPEST
Bugtraq
19. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Accountability
Certification
Trademark
Masquerade
20. Computer Incident Response Team
Boot-sector Virus
IRC
SQL (Structured Query Language)
CIRT
21. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Transposition
Hearsay Evidence
Clipper Chip
Noise & perturbation
22. Once authenticated - the level of access you have to a system
Polymorphic
Script
Format 7 times
Authorization
23. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Security Awareness Training
Asset Value
Digital signing
BIOS
24. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
DMZ
Twisted pair
Separation of duties
WAP (Wireless Application Protocol)
25. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Vulnerability analysis tools
Brute Force
Debug
Repeaters
26. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
TCB
ARO (Annualized Rate of Occurrence)
Reciprocal agreement
27. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
CHAP
Keystroke logging
Service packs
Twisted pair
28. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Probing
Software development lifecycle
Security Perimeter
Substitution
29. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Mandatory vacation
WTLS (Wireless Transport Layer Security)
DAD
Salami Slicing
30. Threat to physical security.
Penetration testing
Sabotage
Username/password
Polymorphism
31. Network Address Translation
NAT
Telnet
IRC
Guards
32. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
SQL (Structured Query Language)
CIA
Raid 0 - 1 - 3 - 5
Caesar Cipher
33. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Passive attacks
Smurf
Code of ethics
Asset Value
34. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Repeaters
Out of band
/etc/passwd
Scanning
35. Repeats the signal. It amplifies the signal before sending it on.
CIO
DDOS
Repeaters
Quantitative
36. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Java
Active attacks
Encryption
Due Diligence
37. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Authentication
Attenuation
CHAP
Vulnerability analysis tools
38. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Trap Door
Security Perimeter
Promiscuous mode
Privacy Act of 1974
39. Chief Executive Officer
CEO
Closed network
Hubs
Smart cards
40. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
CIO
Telnet
Granularity
Active attacks
41. When two or more processes are linked and execute multiple programs simultaneously
MOM
Senior Management
Multiprocessing
Biometrics
42. The ability to have more than one thread associated with a process
Debug
TACACS (Terminal access controller access control system)
Tort
Multithreading
43. Personal - Network - and Application
Rijndael
Sniffing
Risk Mitigation
Firewall types
44. Reasonable doubt
Burden of Proof
Decentralized
Firmware
Transposition
45. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
CHAP
Hacker
Salami Slicing
Call tree
46. A technique to eliminate data redundancy.
TCP Wrappers
Risk Mitigation
CORBA
Normalization
47. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Honey pot
Hardware
Buffer overflow
Macro
48. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Throughput of a Biometric System
Probing
Spoofing
Clipping levels
49. A war dialing utility
SSO (Single sign-on)
Crosstalk
TCB
Toneloc
50. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
TCSEC
Motion detector
Virtual Memory/Pagefile.sys
Bastion hosts
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests