SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To not be legal (as far as law is concerned) or ethical
Biometric profile
Illegal/Unethical
BIA
Checksum
2. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
Security Awareness Training
Stream cipher
TCB
ISDN (Integrated Services Digital Network)
3. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Clipper Chip
CORBA
Finger scanning
COM
4. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
DHCP
Compiler
Brewer-Nash model
5. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Keystroke logging
Firewall types
Probing
Virtual Memory/Pagefile.sys
6. Involving the measurement of quantity or amount.
Nonce
Quantitative
SSH
Virtual Memory/Pagefile.sys
7. When two or more processes are linked and execute multiple programs simultaneously
Bugtraq
Malware
Multiprocessing
Hackers
8. Repeats the signal. It amplifies the signal before sending it on.
Data Mart
Software
Repeaters
Patriot Act
9. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
Skipjack
OSI Model
VPN (Virtual Private Network)
Multitasking
10. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
ARP (Address Resolution Protocol)
Digital signing
Warm Site
Firewall types
11. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Rijndael
SSO (Single sign-on)
Multiprocessing
Expert systems
12. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Finger printing
ISDN (Integrated Services Digital Network)
Security Perimeter
OLE
13. Method of authenticating to a system. Something that you supply and something you know.
Username/password
Risk Management
Due Diligence
Skipjack
14. Enticing people to hit your honeypot to see how they try to access your system.
NAT
Service packs
Dogs
Enticement
15. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Buffer overflow
CRC (Cyclic Redundancy Check)
Tort
Checksum
16. Data storage formats and equipment that allow the stored data to be accessed in any order
TACACS (Terminal access controller access control system)
Inference
RAM (Random-access memory)
Classes of IP networks
17. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Classes of IP networks
Dictionary Attack
Trap Door
Salami Slicing
18. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
DCOM
Routers
Script kiddies
Authorization creep
19. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Senior Management
l0pht
Guards
Acceptable use
20. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Encryption
Throughput of a Biometric System
Boot-sector Virus
Change management
21. Relating to quality or kind. This assigns a level of importance to something.
DMZ
Qualitative
Hash
Custodian
22. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Reciprocal agreement
Replay
CEO
AES (Advanced Encryption Standard)
23. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s
WTLS (Wireless Transport Layer Security)
Diffie-Hellman
Security kernel
Hearsay Evidence
24. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Data remanence
Reciprocal agreement
Switches / Bridges
Cold Site
25. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Illegal/Unethical
VLANs
Risk Transferring
IRC
26. A gas used in fire suppression. Not human safe. Chemical reaction.
Clipping levels
Accountability
Halon
Encryption
27. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
DMZ
Custodian
Biometric profile
Base-64
28. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Symmetric
ROM (Read-only memory)
PKI
Warm Site
29. When one key of a two-key pair has more encryption pattern than the other
Data remanence
Asymmetric
Closed network
Job rotation
30. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
War driving
MitM
ActiveX Object Linking and Embedding
CIA
31. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
WAP (Wireless Application Protocol)
Substitution
Audit Trail
l0pht
32. Emanations from one wire coupling with another wire
Senior Management
SSL/TLS
Crosstalk
Identification
33. A technique to eliminate data redundancy.
Privacy Act of 1974
Fire extinguisher
Accreditation
Normalization
34. A hidden communications channel on a system that allows for the bypassing of the system security policy
Covert channels
Guards
Call tree
Clipping levels
35. Also known as a tunnel)
Promiscuous mode
DCOM
VPN (Virtual Private Network)
Diffie-Hellman
36. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
COOP
Echelon
Decentralized
Exit interview
37. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Logic bomb
Session Hijacking
Kerberos
Switches / Bridges
38. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Repeaters
Embezzlement
DAD
DOS
39. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Separation of duties
DHCP
Stream cipher
Active attacks
40. Dynamic Host Configuration Protocol.
Stream cipher
Content dependant
SYN Flood
DHCP
41. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Patriot Act
CCTV
Finger printing
Bugtraq
42. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Checksum
Data Mart
CRC (Cyclic Redundancy Check)
Echelon
43. Someone whose hacking is primarily targeted at the phone systems
Incentive programs
Phreaker
Entrapment
Schema
44. Disclosure - Alteration - Destruction. These things break the CIA triad
Stream cipher
DAD
Closed network
Aggregation
45. Also civil law
Tort
SYN Flood
Privacy Act of 1974
SSH
46. CISSPs subscribe to a code of ethics for building up the security profession
Privacy Act of 1974
Certification
Code of ethics
TACACS (Terminal access controller access control system)
47. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
CORBA
Smurf
Finger printing
Tailgating / Piggybacking
48. When security is managed at a central point in an organization
Birthday attack
Centralized
Code of ethics
Service packs
49. Distributed Component Object Model. Microsoft's implementation of CORBA.
Repeaters
DOS
DCOM
Virtual Memory/Pagefile.sys
50. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Well-known ports
VLANs
Risk Acceptance
Sniffing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests