SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A sandbox. Emulates an operating environment.
Boot-sector Virus
Virtual machine
Incentive programs
Spoofing
2. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Fire extinguisher
Kerberos
Classes of IP networks
Script
3. Common Object Request Broker Architecture.
Clipper Chip
CORBA
Man trap
CHAP
4. Repeats the signal. It amplifies the signal before sending it on.
AES (Advanced Encryption Standard)
Repeaters
DOS
Guards
5. In a separation of duties model - this is where code is checked in and out
Authorization
COOP
Software librarian
Acceptable use
6. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Guards
Senior Management
Debug
TCP Wrappers
7. Dialing fixed sets telephone numbers looking for open modem connections to machines
Multiprocessing
Enticement
Biometrics
War dialing
8. A gas used in fire suppression. Not human safe. Chemical reaction.
Risk Mitigation
WTLS (Wireless Transport Layer Security)
COM
Halon
9. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
DDOS
Risk Transferring
Routers
TCP Wrappers
10. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Authorization creep
Expert systems
Hot Site
Two-Factor Authentication
11. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Multitasking
Worm
Quantitative
Probing
12. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Caesar Cipher
Substitution
AES (Advanced Encryption Standard)
Accreditation
13. Motive - Opportunity - and Means. These deal with crime.
Fraggle
Firewall types
Promiscuous mode
MOM
14. A war dialing utility
Tort
MOM
Toneloc
Dogs
15. Encompasses Risk Analysis and Risk Mitigation
VLANs
Risk Management
User
Schema
16. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
DNS cache poisoning
ARP (Address Resolution Protocol)
Packet Sniffing
Hearsay Evidence
17. Personal - Network - and Application
VPN (Virtual Private Network)
Script
Firewall types
Social engineering
18. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
War dialing
TCB
Exit interview
Acceptable use
19. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Trade Secret
Two-Factor Authentication
Finger scanning
CIA
20. Reasonable doubt
Asymmetric
Mandatory vacation
Guards
Burden of Proof
21. Jumping into dumpsters to retrieve information about someone/something/a company
Dumpster diving
Coax
SSH
Tokens
22. The output of a hash function is a digest.
War dialing
Digest
Privacy Act of 1974
Smurf
23. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
CORBA
Custodian
Separation of duties
Digest
24. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Due Diligence
PKI
Non-repudiation
Clipping levels
25. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
MitM
Custodian
CIO
Raid 0 - 1 - 3 - 5
26. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Checksum
FAR/FRR/CER
Privacy Act of 1974
Hacker
27. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Data Mart
Boot-sector Virus
Checksum
VLANs
28. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Birthday attack
Non-repudiation
ROT-13
DDOS
29. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Buffer overflow
Privacy Act of 1974
Throughput of a Biometric System
ActiveX Object Linking and Embedding
30. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Artificial Neural Networks (ANN)
Trademark
BIA
Smurf
31. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Clipping levels
UUEncode
Fiber optic
Base-64
32. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
CD-Rom
Logic bomb
Probing
Masquerade
33. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Transposition
Base-64
Compiler
Brewer-Nash model
34. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Enticement
Authentication
Well-known ports
Passive attacks
35. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
CORBA
ISDN (Integrated Services Digital Network)
TACACS (Terminal access controller access control system)
Debug
36. Animals with teeth. Not as discriminate as guards
Motion detector
Honey pot
Debug
Dogs
37. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Man trap
TCP Wrappers
Teardrop
Bastion hosts
38. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Replay
Dumpster diving
VLANs
Hubs
39. Distributed Component Object Model. Microsoft's implementation of CORBA.
SSO (Single sign-on)
Replay
Senior Management
DCOM
40. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Base-64
Multithreading
Worm
Hash
41. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Exit interview
SYN Flood
Risk Analysis
Smurf
42. A network entity that provides a single entrance / exit point to the Internet.
Bastion hosts
VPN (Virtual Private Network)
Risk Analysis
DAD
43. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Trademark
Embezzlement
Base-64
Clipping levels
44. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Man trap
SSL/TLS
Trademark
Fire extinguisher
45. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Private Addressing
SSL/TLS
AES (Advanced Encryption Standard)
Virtual machine
46. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
WAP (Wireless Application Protocol)
Schema
Callback Security/Call Forwarding
Exit interview
47. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Compiler
Detective - Preventive - Corrective
Diffie-Hellman
Security through obscurity
48. Emanations from one wire coupling with another wire
CEO
Crosstalk
Format 7 times
Patent
49. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Repeaters
Authorization
TACACS (Terminal access controller access control system)
Copyright
50. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Clipping levels
TACACS (Terminal access controller access control system)
Classes of IP networks
Call tree