SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Transferring your risk to someone else - typically an insurance company
CORBA
Classes of IP networks
Security Awareness Training
Risk Transferring
2. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Patent
DNS cache poisoning
Normalization
Security Perimeter
3. Closed Circuit Television
Vulnerability analysis tools
Technical - Administrative - Physical
Malware
CCTV
4. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Coax
Service packs
Trap Door
TACACS (Terminal access controller access control system)
5. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
Replay
SSO (Single sign-on)
CIA
Trojan horses
6. A RFC standard. A mechanism for performing commands on a remote system
EF (Exposure Factor)
Telnet
Asset Value
Burden of Proof
7. The act of identifying yourself. Providing your identity to a system
Identification
ISDN (Integrated Services Digital Network)
Username/password
Base-64
8. 'If you cant see it - its secure'. Bad policy to live by.
Authorization
Toneloc
Security through obscurity
RAM (Random-access memory)
9. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Eavesdropping
Reciprocal agreement
Cold Site
Closed network
10. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Substitution
OSI Model
Checksum
RADIUS (Remote authentication dial-in user service)
11. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
IAB
Cookies
Content dependant
CGI (The Common Gateway Interface)
12. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
ALE (Annualized Loss Expectancy)
WAP (Wireless Application Protocol)
Call tree
Granularity
13. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
DHCP
DCOM
CIA
Change management
14. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Throughput of a Biometric System
Worm
Packet Sniffing
Acceptable use
15. A system designed to stop piggybacking.
War driving
Service packs
Man trap
Username/password
16. When one key of a two-key pair has more encryption pattern than the other
Risk Transferring
Multitasking
Checksum
Asymmetric
17. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Job rotation
Key Escrow
Format 7 times
Risk Transferring
18. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Buffer overflow
TEMPEST
Hot Site
Diffie-Hellman
19. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Multitasking
BIA
Motion detector
Copyright
20. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
ISDN (Integrated Services Digital Network)
Multiprocessing
Authorization creep
Buffer overflow
21. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Phreaker
CIO
Key Escrow
Bugtraq
22. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Birthday attack
Spoofing
Passive attacks
Code of ethics
23. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Logic bomb
Transposition
DNS cache poisoning
Substitution
24. Motivational tools for employee awareness to get them to report security flaws in an organization
Software
Wiretapping
Reciprocal agreement
Incentive programs
25. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
Penetration testing
Security Perimeter
Software development lifecycle
OSI Model
26. A gas used in fire suppression. Not human safe. Chemical reaction.
l0pht
Trade Secret
Man trap
Halon
27. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Salami Slicing
Patriot Act
Hot Site
Substitution
28. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
FAR/FRR/CER
Smart cards
UUEncode
Authentication
29. Occupant Emergency Plan - Employees are the most important!
OEP
Cryptanalysis
Finger printing
Security kernel
30. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
Transposition
Halon
Echelon
DNS cache poisoning
31. White hat l0pht
Cookies
Bugtraq
CIO
Covert channels
32. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
User
Teardrop
WTLS (Wireless Transport Layer Security)
Multitasking
33. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Encryption
CHAP
SESAME
Security kernel
34. Threat to physical security.
Sabotage
Tailgating / Piggybacking
Risk Transferring
SSH
35. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Smart cards
Buffer overflow
War driving
Repeaters
36. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
Clipping levels
SYN Flood
Termination procedures
DDOS
37. In the broadest sense - a fraud is a deception made for personal gain
ROM (Read-only memory)
Fraud
Multipartite
IAB
38. Software designed to infiltrate or damage a computer system - without the owner's consent.
Copyright
Malware
CD-Rom
Content dependant
39. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Caesar Cipher
Clipping levels
Script
MitM
40. Scanning the airwaves for radio transmissions
Honey pot
Replay
Scanning
Multipartite
41. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Decentralized
Checksum
Noise & perturbation
Due Care
42. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Code of ethics
War driving
BIA
Callback Security/Call Forwarding
43. Someone who hacks
Cookies
Hacker
Nonce
ISDN (Integrated Services Digital Network)
44. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Private Addressing
Polymorphism
Base-64
Biometrics
45. Accepting all packets
Polymorphic
Promiscuous mode
Social engineering
Inference
46. An instance of a scripting language
Echelon
Smart cards
ROM (Read-only memory)
Script
47. Must be in place for you to use a biometric system
Cyphertext only
Vulnerability analysis tools
Telnet
Biometric profile
48. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
User
Risk Acceptance
Exit interview
Tailgating / Piggybacking
49. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Reciprocal agreement
Symmetric
WAP (Wireless Application Protocol)
Closed network
50. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Fire extinguisher
Decentralized
EF (Exposure Factor)
Twisted pair
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests