SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Debug
Buffer overflow
Reciprocal agreement
CCTV
2. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
Clipping levels
TCSEC
FAR/FRR/CER
DMZ
3. Involving the measurement of quantity or amount.
Fiber optic
Quantitative
WAP (Wireless Application Protocol)
Security Perimeter
4. A network that mimics the brain
ISDN (Integrated Services Digital Network)
Artificial Neural Networks (ANN)
ROM (Read-only memory)
Privacy Act of 1974
5. The process of reducing your risks to an acceptable level based on your risk analysis
Risk Mitigation
War dialing
Security Perimeter
ISDN (Integrated Services Digital Network)
6. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
Service packs
ARP (Address Resolution Protocol)
SSL/TLS
CIRT
7. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
/etc/passwd
Granularity
Due Diligence
Risk Management
8. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
DCOM
Boot-sector Virus
Clipper Chip
Cookies
9. An attempt to trick the system into believing that something false is real
TCB
ActiveX Object Linking and Embedding
Hoax
Incentive programs
10. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
COM
Classes of IP networks
Separation of duties
Trade Secret
11. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
MitM
Teardrop
Polymorphism
Passive attacks
12. A network that uses standard protocols (TCP/IP)
Promiscuous mode
Open network
Teardrop
COOP
13. The act of identifying yourself. Providing your identity to a system
Hoax
Identification
l0pht
CIRT
14. Internet Relay Chat.
Trojan horses
Probing
WAP (Wireless Application Protocol)
IRC
15. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Diffie-Hellman
Polymorphism
Detective - Preventive - Corrective
DHCP
16. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
ROT-13
Throughput of a Biometric System
Two-Factor Authentication
Closed network
17. A sandbox. Emulates an operating environment.
Vulnerability analysis tools
DOS
Virtual machine
Hacker
18. A gas used in fire suppression. Not human safe. Chemical reaction.
Senior Management
Risk Analysis
Halon
Noise & perturbation
19. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.
IRC
UUEncode
Carnivore
Accreditation
20. A network that uses proprietary protocols
Warm Site
Closed network
OLE
Due Care
21. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Audit Trail
Non-repudiation
Scanning
Hoax
22. Scanning the airwaves for radio transmissions
Halon
Enticement
Cyphertext only
Scanning
23. Access control method for database based on the content of the database to provide granular access
Checksum
Accreditation
Content dependant
Security through obscurity
24. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
OSI Model
User
Asset Value
Cyphertext only
25. Network devices that operate at layer 3. This device separates broadcast domains.
Routers
ROM (Read-only memory)
Finger scanning
Call tree
26. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
CRC (Cyclic Redundancy Check)
Worm
Open network
ActiveX Object Linking and Embedding
27. Defines the objects and their attributes that exist in a database.
Schema
DNS cache poisoning
Asset Value
Inference
28. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
WTLS (Wireless Transport Layer Security)
Software development lifecycle
TCSEC
Rijndael
29. The practice of obtaining confidential information by manipulation of legitimate users.
AES (Advanced Encryption Standard)
Passive attacks
Social engineering
NAT
30. Transferring your risk to someone else - typically an insurance company
Switches / Bridges
Accreditation
Risk Transferring
Security Perimeter
31. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Rolling hot sites
Boot-sector Virus
Social engineering
Back door/ trap door/maintenance hook
32. Closed Circuit Television
Checksum
Fraggle
CCTV
Username/password
33. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Warm Site
TCB
Classes of IP networks
Key Escrow
34. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
Scanning
Repeaters
Sabotage
OSI Model
35. Public Key Infrastructure
PKI
Wiretapping
Rijndael
Audit Trail
36. A technique to eliminate data redundancy.
Switches / Bridges
Rolling hot sites
Normalization
Teardrop
37. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Noise & perturbation
Rolling hot sites
Firewall types
Security Awareness Training
38. Must be in place for you to use a biometric system
Service packs
Noise & perturbation
Risk Transferring
Biometric profile
39. A military standard defining controls for emanation protection
Toneloc
Stream cipher
TEMPEST
DDOS
40. Disclosure - Alteration - Destruction. These things break the CIA triad
CCTV
DNS cache poisoning
Fire extinguisher
DAD
41. The user
Base-64
Boot-sector Virus
User
Honey pot
42. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Wiretapping
Java
Trap Door
War driving
43. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
Closed network
Multiprocessing
Hackers
DDOS
44. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Certification
Separation of duties
Logic bomb
Common criteria
45. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Debug
Software development lifecycle
Guards
Multitasking
46. These viruses usually infect both boot records and files.
Multipartite
Authorization creep
Tailgating / Piggybacking
Firmware
47. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Due Diligence
Logic bomb
Brute Force
TEMPEST
48. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
War dialing
Brewer-Nash model
Degausser
Halon
49. In a separation of duties model - this is where code is checked in and out
Software librarian
Caesar Cipher
Embezzlement
Salami Slicing
50. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Sabotage
VPN (Virtual Private Network)
Crosstalk
Multitasking
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests