SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Distributed Component Object Model. Microsoft's implementation of CORBA.
Well-known ports
DCOM
Job rotation
BIA
2. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Smurf
DOS
Security through obscurity
Hash
3. An instance of a scripting language
RAM (Random-access memory)
Classes of IP networks
Script
Tokens
4. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
Script kiddies
Repeaters
Brute Force
DNS cache poisoning
5. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Diffie-Hellman
Clipper Chip
Biometrics
Firmware
6. Once authenticated - the level of access you have to a system
Session Hijacking
l0pht
Authorization
Digital signing
7. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Expert systems
Hackers
Brute force
Mandatory vacation
8. Confidentiality - Integrity - and Availability
CIA
Symmetric
Well-known ports
Hot Site
9. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
CHAP
UUEncode
Fiber optic
FAR/FRR/CER
10. A card that holds information that must be authenticated to before it can reveal the information that it is holding
DCOM
Attenuation
Clipper Chip
Smart cards
11. The act of identifying yourself. Providing your identity to a system
Identification
Dictionary Attack
Hash
Fraggle
12. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Polymorphic
Hardware
War dialing
Content dependant
13. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Qualitative
WTLS (Wireless Transport Layer Security)
Sabotage
Risk Analysis
14. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Guards
Honey pot
Patriot Act
Clipping levels
15. Object Linking and Embedding. The ability of an object to be embedded into another object.
Risk Management
Macro
OLE
MitM
16. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Fences
Quality Assurance
Firmware
Social engineering
17. Relating to quality or kind. This assigns a level of importance to something.
Hash
Trojan horses
Keystroke logging
Qualitative
18. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Custodian
BIA
Non-repudiation
Replay
19. Encompasses Risk Analysis and Risk Mitigation
Salami Slicing
Two-Factor Authentication
CRC (Cyclic Redundancy Check)
Risk Management
20. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Multiprocessing
Multitasking
Sniffing
DMZ
21. Dialing fixed sets telephone numbers looking for open modem connections to machines
TCSEC
MitM
War dialing
Brute Force
22. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Security kernel
OLE
Smart cards
Wiretapping
23. Continuation of Operations Plan
COOP
Quantitative
Coax
FAR/FRR/CER
24. Same as a block cipher except that it is applied to a data stream one bit at a time
Software
Stream cipher
UUEncode
Fire extinguisher
25. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
ARP (Address Resolution Protocol)
Salami Slicing
COOP
Fences
26. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
CIA
OLE
Common criteria
Termination procedures
27. Network devices that operate at layer 3. This device separates broadcast domains.
ARP (Address Resolution Protocol)
Multitasking
Code of ethics
Routers
28. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Malware
Normalization
Stream cipher
Switches / Bridges
29. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Certification
Biometrics
Privacy Act of 1974
Guards
30. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
DCOM
Hubs
Fiber optic
Honey pot
31. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
Joke
Clipping levels
Kerberos
Spoofing
32. Chief Executive Officer
Buffer overflow
Software
CEO
CD-Rom
33. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
OLE
PKI
Hackers
Crosstalk
34. A network that mimics the brain
Artificial Neural Networks (ANN)
Cyphertext only
Cold Site
SQL (Structured Query Language)
35. Assuming someone's session who is unaware of what you are doing
Session Hijacking
Service packs
Certification
Mandatory vacation
36. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Software development lifecycle
Session Hijacking
Guards
Checksum
37. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Privacy Act of 1974
Two-Factor Authentication
Risk Acceptance
Enticement
38. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Expert systems
Skipjack
NAT
Telnet
39. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
UUEncode
Enticement
CEO
Encryption
40. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Clipper Chip
Artificial Neural Networks (ANN)
Fiber optic
Classes of IP networks
41. Using ICMP to diagram a network
Finger scanning
Probing
ROM (Read-only memory)
Digital certificates
42. Network device that operates at layer 1. Concentrator.
Tort
Hearsay Evidence
Username/password
Hubs
43. Motive - Opportunity - and Means. These deal with crime.
Logic bomb
Worm
MOM
Cyphertext only
44. A hidden communications channel on a system that allows for the bypassing of the system security policy
Fraud
COOP
Coax
Covert channels
45. Defines the objects and their attributes that exist in a database.
War driving
Authorization
Schema
Boot-sector Virus
46. White hat l0pht
Expert systems
Kerberos
Bugtraq
ARO (Annualized Rate of Occurrence)
47. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Trap Door
MitM
Packet Sniffing
SLE (Single Loss Expectancy or Exposure)
48. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Callback Security/Call Forwarding
Hacker
Crosstalk
Packet Sniffing
49. Jumping into dumpsters to retrieve information about someone/something/a company
Boot-sector Virus
Dumpster diving
Expert systems
SSO (Single sign-on)
50. A mechanism by which connections to TCP services on a system are allowed or disallowed
Phreaker
TCP Wrappers
War driving
User