SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Quantitative
War driving
CIA
Clipper Chip
2. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Telnet
SSH
Expert System
Change management
3. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
BIA
Rijndael
Asymmetric
Call tree
4. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
DHCP
Cookies
Debug
Block cipher
5. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
Checksum
TCP Wrappers
Dictionary Attack
TCB
6. Object Linking and Embedding. The ability of an object to be embedded into another object.
SSL/TLS
Enticement
Closed network
OLE
7. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
Scanning
Firewall types
DMZ
SYN Flood
8. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Degausser
Two-Factor Authentication
Finger scanning
Boot-sector Virus
9. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Social engineering
Dictionary Attack
Virtual machine
Switches / Bridges
10. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Dogs
DOS
Well-known ports
ActiveX Object Linking and Embedding
11. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Carnivore
Risk Analysis
Fiber optic
DAD
12. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Worm
Guards
Change management
Brute force
13. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Wiretapping
Biometric profile
SESAME
Risk Analysis
14. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
Risk Acceptance
AES (Advanced Encryption Standard)
Artificial Neural Networks (ANN)
ISDN (Integrated Services Digital Network)
15. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
CIRT
Sniffing
Hot Site
Risk Management
16. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Technical - Administrative - Physical
Dogs
Penetration testing
SLE (Single Loss Expectancy or Exposure)
17. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Termination procedures
Script kiddies
Java
SYN Flood
18. Dialing fixed sets telephone numbers looking for open modem connections to machines
War dialing
Telnet
Motion detector
Cryptanalysis
19. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Bugtraq
Spoofing
Aggregation
Cyphertext only
20. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Digital certificates
IRC
Detective - Preventive - Corrective
Finger printing
21. Motive - Opportunity - and Means. These deal with crime.
MOM
Dictionary Attack
Entrapment
RAM (Random-access memory)
22. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Degausser
OSI Model
Security kernel
Routers
23. Chief Information Officer
Enticement
Hoax
CIO
BIOS
24. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
ARP (Address Resolution Protocol)
Social engineering
Fraggle
Cyphertext only
25. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Compiler
Due Diligence
Classes of IP networks
Change management
26. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
PAP (Password Authentication Protocol)
Biometrics
DDOS
DNS cache poisoning
27. Animals with teeth. Not as discriminate as guards
TCSEC
Covert channels
Dogs
Scanning
28. Emanations from one wire coupling with another wire
Technical - Administrative - Physical
Coax
/etc/passwd
Crosstalk
29. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
Worm
Patriot Act
Rijndael
Diffie-Hellman
30. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Exit interview
Carnivore
EF (Exposure Factor)
Expert System
31. A network that mimics the brain
CHAP
Security kernel
Artificial Neural Networks (ANN)
Kerberos
32. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Tailgating / Piggybacking
Common criteria
Brute Force
Smurf
33. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Inference
Crosstalk
Toneloc
Patriot Act
34. Setting up the user to access the honeypot for reasons other than the intent to harm.
SSL/TLS
Entrapment
ActiveX Object Linking and Embedding
Due Diligence
35. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
OSI Model
DAD
Vulnerability analysis tools
Crosstalk
36. An attempt to trick the system into believing that something false is real
Termination procedures
Hoax
Format 7 times
Aggregation
37. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
CORBA
Fraggle
SLE (Single Loss Expectancy or Exposure)
OEP
38. Basic Input/Output System
Risk Mitigation
Rijndael
BIOS
Risk Management
39. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Brewer-Nash model
PAP (Password Authentication Protocol)
Crosstalk
Polymorphic
40. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Acceptable use
Finger scanning
Digest
Debug
41. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Digest
Transposition
Private Addressing
Base-64
42. Also civil law
Security Perimeter
VLANs
WAP (Wireless Application Protocol)
Tort
43. Method of authenticating to a system. Something that you supply and something you know.
Skipjack
Risk Transferring
Username/password
Patriot Act
44. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
CHAP
BIOS
Aggregation
Cookies
45. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Finger scanning
Security Perimeter
Hackers
Multitasking
46. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Encryption
Biometrics
Finger printing
VPN (Virtual Private Network)
47. Making individuals accountable for their actions on a system typically through the use of auditing
OEP
BIOS
Accountability
Artificial Neural Networks (ANN)
48. Repeats the signal. It amplifies the signal before sending it on.
Teardrop
DMZ
Repeaters
Open network
49. Scanning the airwaves for radio transmissions
Boot-sector Virus
Scanning
Hardware
Telnet
50. Disclosure - Alteration - Destruction. These things break the CIA triad
Scanning
DAD
BIOS
SESAME
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests