SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Network device that operates at layer 1. Concentrator.
Expert System
DCOM
Logic bomb
Hubs
2. Access control method for database based on the content of the database to provide granular access
Content dependant
Guards
Mandatory vacation
Non-repudiation
3. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Rolling hot sites
Trap Door
Warm Site
Hackers
4. Network devices that operate at layer 3. This device separates broadcast domains.
Routers
Senior Management
Firewall types
Java
5. Computer Incident Response Team
Well-known ports
/etc/passwd
CIRT
SLE (Single Loss Expectancy or Exposure)
6. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
Script
Closed network
Active attacks
l0pht
7. When security is managed at many different points in an organization
WTLS (Wireless Transport Layer Security)
TACACS (Terminal access controller access control system)
Decentralized
RADIUS (Remote authentication dial-in user service)
8. Defines the objects and their attributes that exist in a database.
Schema
Content dependant
CD-Rom
ARP (Address Resolution Protocol)
9. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Transposition
Schema
Call tree
Security Awareness Training
10. To not be legal (as far as law is concerned) or ethical
Illegal/Unethical
DCOM
Replay
Digital certificates
11. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Masquerade
Worm
SSH
Decentralized
12. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Copyright
DOS
SSL/TLS
Sabotage
13. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Centralized
Dictionary Attack
Multitasking
Man trap
14. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Penetration testing
Guards
Inference
SQL (Structured Query Language)
15. CISSPs subscribe to a code of ethics for building up the security profession
Inference
SESAME
Promiscuous mode
Code of ethics
16. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Throughput of a Biometric System
SSH
Checksum
Virtual Memory/Pagefile.sys
17. A network that uses standard protocols (TCP/IP)
Open network
Risk Management
Security Awareness Training
Man trap
18. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Polymorphism
DOS
Decentralized
TEMPEST
19. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
Authorization creep
Logic bomb
Echelon
ROT-13
20. Providing verification to a system
CRC (Cyclic Redundancy Check)
Compiler
Schema
Authentication
21. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
MOM
Honey pot
Fire extinguisher
DNS cache poisoning
22. Reasonable doubt
ROM (Read-only memory)
Burden of Proof
ALE (Annualized Loss Expectancy)
Rijndael
23. Must be in place for you to use a biometric system
Active attacks
Probing
Biometric profile
Motion detector
24. Signal degradation as it moves farther from its source
Attenuation
Enticement
Reciprocal agreement
Tokens
25. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Telnet
ALE (Annualized Loss Expectancy)
Aggregation
War driving
26. In a separation of duties model - this is where code is checked in and out
CRC (Cyclic Redundancy Check)
Software librarian
Hearsay Evidence
WTLS (Wireless Transport Layer Security)
27. Dynamic Host Configuration Protocol.
Masquerade
Repeaters
Hoax
DHCP
28. Scanning the airwaves for radio transmissions
Honey pot
Expert systems
Twisted pair
Scanning
29. Enticing people to hit your honeypot to see how they try to access your system.
Burden of Proof
UUEncode
Enticement
Classes of IP networks
30. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Detective - Preventive - Corrective
SSO (Single sign-on)
Privacy Act of 1974
Session Hijacking
31. Chief Information Officer
CIO
Enticement
Bastion hosts
Joke
32. After implementing countermeasures - accepting risk for the amount of vulnerability left over
l0pht
Risk Acceptance
IRC
Accreditation
33. The person that determines the permissions to files. The data owner.
Owner
Transposition
/etc/passwd
Brute force
34. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Rolling hot sites
Software development lifecycle
Halon
SSL/TLS
35. Animals with teeth. Not as discriminate as guards
Dogs
Acceptable use
Expert systems
Aggregation
36. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Penetration testing
Kerberos
Senior Management
Acceptable use
37. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
DHCP
UUEncode
Compiler
Java
38. Closed Circuit Television
Digital certificates
CCTV
Key Escrow
MitM
39. In cryptography - it is a block cipher
Call tree
Skipjack
Trojan horses
DDOS
40. Random Number Base
Nonce
Code of ethics
Masquerade
l0pht
41. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
ISDN (Integrated Services Digital Network)
Risk Transferring
Centralized
Cookies
42. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
DNS cache poisoning
Smurf
BIA
Accreditation
43. Motivational tools for employee awareness to get them to report security flaws in an organization
Warm Site
Script kiddies
Incentive programs
Active attacks
44. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Polymorphism
Covert channels
Fraggle
SSH
45. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Honey pot
Security Awareness Training
Script kiddies
OLE
46. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Accreditation
TACACS (Terminal access controller access control system)
Exit interview
OLE
47. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Risk Acceptance
Dictionary Attack
Digest
Out of band
48. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
Toneloc
Hubs
Promiscuous mode
Spoofing
49. Entails planning and system actions to ensure that a project is following good quality management practices
Toneloc
Quality Assurance
Copyright
CHAP
50. The art of breaking code. Testing the strength of an algorithm.
Cryptanalysis
COM
Firmware
Masquerade
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests