SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When two or more processes are linked and execute multiple programs simultaneously
Hacker
Birthday attack
Multiprocessing
IAB
2. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Owner
Rolling hot sites
TACACS (Terminal access controller access control system)
Motion detector
3. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
l0pht
Well-known ports
Multipartite
Classes of IP networks
4. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Out of band
Mandatory vacation
Decentralized
SQL (Structured Query Language)
5. Setting up the user to access the honeypot for reasons other than the intent to harm.
Key Escrow
Entrapment
Digital signing
Encryption
6. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Fraggle
MitM
Accountability
Trade Secret
7. More discriminate than dogs
Guards
Hash
Symmetric
Non-repudiation
8. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Base-64
Halon
SSH
Schema
9. The real cost of acquiring/maintaining/developing a system
Macro
Asset Value
Multithreading
Multiprocessing
10. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Cookies
WAP (Wireless Application Protocol)
Dumpster diving
Privacy Act of 1974
11. Scanning the airwaves for radio transmissions
Asymmetric
Scanning
Expert systems
Acceptable use
12. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
ALE (Annualized Loss Expectancy)
Entrapment
CRC (Cyclic Redundancy Check)
Software development lifecycle
13. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
OEP
Reciprocal agreement
Replay
14. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Expert systems
Risk Analysis
TCP Wrappers
Open network
15. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
SYN Flood
Hubs
Virtual Memory/Pagefile.sys
Key Escrow
16. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Noise & perturbation
WTLS (Wireless Transport Layer Security)
Multitasking
SQL (Structured Query Language)
17. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
DMZ
Telnet
Hash
Granularity
18. Internet Relay Chat.
RADIUS (Remote authentication dial-in user service)
Call tree
IRC
Risk Acceptance
19. A gas used in fire suppression. Not human safe. Chemical reaction.
Two-Factor Authentication
Active attacks
War driving
Halon
20. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Identification
DDOS
Finger printing
Hoax
21. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Throughput of a Biometric System
Kerberos
Salami Slicing
IAB
22. The intercepting of conversations by unintended recipients
War dialing
ROT-13
Enticement
Eavesdropping
23. The output of a hash function is a digest.
Spoofing
Digest
Checksum
Brute force
24. Entails planning and system actions to ensure that a project is following good quality management practices
ActiveX Object Linking and Embedding
IAB
Hardware
Quality Assurance
25. Using ICMP to diagram a network
Tailgating / Piggybacking
Finger printing
Probing
Granularity
26. A site that is ready physically but has no hardware in place - all it has is HVAC
Crosstalk
Mandatory vacation
SESAME
Cold Site
27. Signal degradation as it moves farther from its source
Attenuation
Carnivore
Centralized
Brewer-Nash model
28. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Fences
Risk Acceptance
Software development lifecycle
Encryption
29. Occupant Emergency Plan - Employees are the most important!
Fiber optic
Encryption
OEP
Data Mart
30. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Service packs
Exit interview
Fraggle
Separation of duties
31. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Two-Factor Authentication
Finger scanning
Data Mart
BIA
32. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Exit interview
Hackers
Script
Normalization
33. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Two-Factor Authentication
TCSEC
Brewer-Nash model
RAM (Random-access memory)
34. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Caesar Cipher
Wiretapping
Detective - Preventive - Corrective
Expert systems
35. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
RADIUS (Remote authentication dial-in user service)
Biometrics
Repeaters
War driving
36. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Quantitative
Mandatory vacation
Inference
SESAME
37. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Job rotation
Penetration testing
User
Private Addressing
38. Making individuals accountable for their actions on a system typically through the use of auditing
Accountability
Virtual machine
Back door/ trap door/maintenance hook
Covert channels
39. Distributed Component Object Model. Microsoft's implementation of CORBA.
DCOM
Software development lifecycle
Java
OSI Model
40. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
CIO
Fraggle
CHAP
COM
41. A network entity that provides a single entrance / exit point to the Internet.
Change management
Bastion hosts
Boot-sector Virus
Java
42. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Risk Acceptance
Passive attacks
Brewer-Nash model
Debug
43. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Toneloc
DOS
FAR/FRR/CER
Hackers
44. Repeats the signal. It amplifies the signal before sending it on.
Repeaters
Authorization
TCP Wrappers
Keystroke logging
45. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
FAR/FRR/CER
TCB
Fraud
Clipper Chip
46. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Checksum
Sniffing
Switches / Bridges
Acceptable use
47. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Incentive programs
Promiscuous mode
Base-64
TACACS (Terminal access controller access control system)
48. Disclosure - Alteration - Destruction. These things break the CIA triad
DAD
ActiveX Object Linking and Embedding
OLE
Malware
49. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Quality Assurance
Out of band
Call tree
Toneloc
50. Accepting all packets
Promiscuous mode
Coax
Active attacks
Non-repudiation