SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
Normalization
Active attacks
Accountability
2. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Fire extinguisher
Promiscuous mode
DMZ
WTLS (Wireless Transport Layer Security)
3. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Due Diligence
TCP Wrappers
Passive attacks
Twisted pair
4. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
Transposition
l0pht
Toneloc
Echelon
5. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Authorization creep
Checksum
Change management
Patriot Act
6. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Hash
Hackers
Termination procedures
Attenuation
7. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Callback Security/Call Forwarding
Private Addressing
Logic bomb
Twisted pair
8. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Software librarian
Audit Trail
Hacker
Tokens
9. Enticing people to hit your honeypot to see how they try to access your system.
Code of ethics
Logic bomb
Block cipher
Enticement
10. Dynamic Host Configuration Protocol.
Software librarian
Hoax
Degausser
DHCP
11. More discriminate than dogs
Incentive programs
Multipartite
Embezzlement
Guards
12. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Back door/ trap door/maintenance hook
Passive attacks
Object Oriented Programming
Java
13. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Owner
Checksum
Enticement
Symmetric
14. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
ISDN (Integrated Services Digital Network)
Acceptable use
Nonce
Salami Slicing
15. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Multitasking
UUEncode
Firmware
BIOS
16. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Trojan horses
EF (Exposure Factor)
Multipartite
Carnivore
17. Scanning the airwaves for radio transmissions
VPN (Virtual Private Network)
Brute force
Scanning
DMZ
18. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Firewall types
Owner
Exit interview
Man trap
19. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Out of band
Hot Site
Script
AES (Advanced Encryption Standard)
20. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Owner
ROM (Read-only memory)
SQL (Structured Query Language)
Identification
21. Basic Input/Output System
VLANs
BIOS
Encryption
Two-Factor Authentication
22. 'If you cant see it - its secure'. Bad policy to live by.
Malware
Masquerade
Security through obscurity
DCOM
23. Ethernet - Cat5 - Twisted to allow for longer runs.
Switches / Bridges
Cryptanalysis
Twisted pair
MOM
24. Must be in place for you to use a biometric system
SYN Flood
l0pht
Session Hijacking
Biometric profile
25. CISSPs subscribe to a code of ethics for building up the security profession
Code of ethics
MitM
Cyphertext only
Boot-sector Virus
26. Threat to physical security.
Separation of duties
Data Mart
Sabotage
Digital signing
27. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Centralized
Mandatory vacation
Risk Mitigation
Firewall types
28. A network that uses standard protocols (TCP/IP)
Open network
Phreaker
War dialing
Custodian
29. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Qualitative
Cold Site
SESAME
Due Diligence
30. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Packet Sniffing
Enticement
DAD
VPN (Virtual Private Network)
31. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Finger scanning
Risk Transferring
TEMPEST
Hearsay Evidence
32. Public Key Infrastructure
Firmware
Trap Door
Decentralized
PKI
33. An attempt to trick the system into believing that something false is real
Exit interview
Packet Sniffing
Hoax
UUEncode
34. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Trojan horses
Authorization
Masquerade
Transposition
35. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
DMZ
CGI (The Common Gateway Interface)
Biometrics
Virtual machine
36. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Tort
Aggregation
Owner
Privacy Act of 1974
37. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
SESAME
Software development lifecycle
Common criteria
Compiler
38. Personal - Network - and Application
Firewall types
Probing
War driving
Fiber optic
39. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Sniffing
Closed network
Data Mart
Open network
40. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Polymorphic
Non-repudiation
Clipper Chip
Inference
41. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Promiscuous mode
Birthday attack
ROT-13
Due Care
42. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Hot Site
Echelon
Trade Secret
Dictionary Attack
43. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Out of band
Technical - Administrative - Physical
Acceptable use
Well-known ports
44. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
NAT
ActiveX Object Linking and Embedding
Substitution
Risk Acceptance
45. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Trademark
Finger scanning
Polymorphic
Worm
46. Relating to quality or kind. This assigns a level of importance to something.
OLE
Qualitative
Well-known ports
Multitasking
47. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Joke
Salami Slicing
Logic bomb
Guards
48. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
ActiveX Object Linking and Embedding
Buffer overflow
Caesar Cipher
Detective - Preventive - Corrective
49. Internet Architecture Board. This board is responsible for protecting the Internet.
l0pht
IAB
Brute Force
Authorization creep
50. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Two-Factor Authentication
Finger printing
Salami Slicing
Out of band
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests