SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Closed Circuit Television
CCTV
Custodian
TEMPEST
TCB
2. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
/etc/passwd
Multipartite
Two-Factor Authentication
Security Awareness Training
3. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
TACACS (Terminal access controller access control system)
Fraggle
SESAME
4. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
DHCP
Hearsay Evidence
PAP (Password Authentication Protocol)
Brewer-Nash model
5. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Masquerade
Digital signing
Software librarian
Rolling hot sites
6. Also civil law
Tort
Code of ethics
Biometrics
Technical - Administrative - Physical
7. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Carnivore
Open network
CD-Rom
Guards
8. The art of breaking code. Testing the strength of an algorithm.
Scanning
Java
ALE (Annualized Loss Expectancy)
Cryptanalysis
9. Computer Incident Response Team
Digital certificates
Trojan horses
CIRT
Fences
10. The intercepting of conversations by unintended recipients
Multitasking
Eavesdropping
Substitution
Warm Site
11. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Virtual machine
Hot Site
Granularity
Virtual Memory/Pagefile.sys
12. Reasonable doubt
AES (Advanced Encryption Standard)
Well-known ports
Hackers
Burden of Proof
13. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
Object Oriented Programming
Phreaker
Trap Door
CRC (Cyclic Redundancy Check)
14. Network Address Translation
Firmware
Rijndael
Birthday attack
NAT
15. Relating to quality or kind. This assigns a level of importance to something.
Quantitative
Burden of Proof
Qualitative
Inference
16. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
Service packs
PAP (Password Authentication Protocol)
Clipper Chip
SLE (Single Loss Expectancy or Exposure)
17. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Hash
Routers
Biometrics
Sniffing
18. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
Trade Secret
Firmware
TCB
DCOM
19. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Rijndael
Fire extinguisher
Cold Site
Data remanence
20. Enticing people to hit your honeypot to see how they try to access your system.
TCB
Embezzlement
Teardrop
Enticement
21. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Digest
Patriot Act
Script kiddies
Logic bomb
22. A system designed to stop piggybacking.
Fences
WTLS (Wireless Transport Layer Security)
Schema
Man trap
23. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
DMZ
Hacker
Stream cipher
Hash
24. A RFC standard. A mechanism for performing commands on a remote system
Telnet
Fraud
Patent
Security Awareness Training
25. Assuming someone's session who is unaware of what you are doing
Expert systems
CIA
Session Hijacking
Accreditation
26. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Owner
Diffie-Hellman
Termination procedures
TCSEC
27. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
Technical - Administrative - Physical
PAP (Password Authentication Protocol)
Promiscuous mode
Birthday attack
28. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Crosstalk
Patent
Multipartite
Authorization creep
29. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Spoofing
SSO (Single sign-on)
TCP Wrappers
Checksum
30. More discriminate than dogs
Guards
Multitasking
IAB
Transposition
31. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Probing
Brute Force
SSO (Single sign-on)
DOS
32. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Open network
Patriot Act
TEMPEST
Security through obscurity
33. These viruses usually infect both boot records and files.
Authorization
Debug
CIO
Multipartite
34. In cryptography - it is a block cipher
Skipjack
Transposition
Repeaters
Smurf
35. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
/etc/passwd
Clipping levels
ActiveX Object Linking and Embedding
TCP Wrappers
36. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Probing
Active attacks
Clipper Chip
Motion detector
37. A site that is ready physically but has no hardware in place - all it has is HVAC
ALE (Annualized Loss Expectancy)
Format 7 times
Data Mart
Cold Site
38. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
SSH
Diffie-Hellman
DOS
Virtual machine
39. Scanning the airwaves for radio transmissions
Scanning
MitM
AES (Advanced Encryption Standard)
Risk Transferring
40. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Nonce
Detective - Preventive - Corrective
Joke
Closed network
41. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Active attacks
Multiprocessing
Clipper Chip
Patriot Act
42. Method of authenticating to a system. Something that you supply and something you know.
Termination procedures
Username/password
DCOM
VPN (Virtual Private Network)
43. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Accreditation
Passive attacks
Trade Secret
AES (Advanced Encryption Standard)
44. 'If you cant see it - its secure'. Bad policy to live by.
Security through obscurity
Risk Management
Finger scanning
Job rotation
45. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Hackers
Probing
Wiretapping
TACACS (Terminal access controller access control system)
46. A war dialing utility
SESAME
Toneloc
Acceptable use
SSH
47. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
CEO
Job rotation
ROT-13
Aggregation
48. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Hackers
Joke
DHCP
Asset Value
49. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Out of band
Covert channels
Non-repudiation
Masquerade
50. White hat l0pht
Inference
Bugtraq
Multipartite
ROT-13