SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These viruses usually infect both boot records and files.
Qualitative
Key Escrow
Multipartite
Clipper Chip
2. Also known as a tunnel)
VPN (Virtual Private Network)
Attenuation
Acceptable use
Callback Security/Call Forwarding
3. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
Granularity
Risk Analysis
ISDN (Integrated Services Digital Network)
Hearsay Evidence
4. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Smurf
Expert System
DNS cache poisoning
Encryption
5. To not be legal (as far as law is concerned) or ethical
Social engineering
Tokens
Illegal/Unethical
SSH
6. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
WTLS (Wireless Transport Layer Security)
ARO (Annualized Rate of Occurrence)
Multitasking
FAR/FRR/CER
7. Internet Architecture Board. This board is responsible for protecting the Internet.
Well-known ports
IAB
Quantitative
Keystroke logging
8. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Script kiddies
Masquerade
Patent
Biometric profile
9. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Clipper Chip
RADIUS (Remote authentication dial-in user service)
Username/password
Format 7 times
10. These can be used to verify that public keys belong to certain individuals.
Finger scanning
Privacy Act of 1974
Digital certificates
Session Hijacking
11. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Object Oriented Programming
Classes of IP networks
Malware
Multitasking
12. When security is managed at a central point in an organization
Owner
CCTV
Centralized
EF (Exposure Factor)
13. A network that uses standard protocols (TCP/IP)
VPN (Virtual Private Network)
Open network
Trojan horses
Brute force
14. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Dictionary Attack
Multiprocessing
CIO
CIA
15. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Cookies
Embezzlement
OSI Model
Honey pot
16. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Call tree
Logic bomb
Buffer overflow
Noise & perturbation
17. Be at least 8 foot tall and have three strands of barbed wire.
Active attacks
Fences
Teardrop
COOP
18. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
SLE (Single Loss Expectancy or Exposure)
Finger scanning
MitM
Cookies
19. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Tokens
Quantitative
Honey pot
Content dependant
20. A sandbox. Emulates an operating environment.
Virtual machine
Format 7 times
Out of band
Accountability
21. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Multipartite
l0pht
Trademark
Echelon
22. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Inference
Switches / Bridges
Hardware
Motion detector
23. The intercepting of conversations by unintended recipients
Masquerade
Exit interview
Eavesdropping
Skipjack
24. A system designed to stop piggybacking.
Cookies
CCTV
Qualitative
Man trap
25. When two or more processes are linked and execute multiple programs simultaneously
Clipping levels
Brute force
Multiprocessing
Polymorphic
26. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
TCB
Classes of IP networks
Brewer-Nash model
NAT
27. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Man trap
DOS
Job rotation
ARP (Address Resolution Protocol)
28. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
WTLS (Wireless Transport Layer Security)
Due Care
Worm
Clipper Chip
29. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Sniffing
Trojan horses
Closed network
Enticement
30. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Substitution
Risk Transferring
Accreditation
Multitasking
31. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Smart cards
Software development lifecycle
Firmware
Security kernel
32. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Well-known ports
IAB
Security through obscurity
Fiber optic
33. Motivational tools for employee awareness to get them to report security flaws in an organization
Logic bomb
ARP (Address Resolution Protocol)
Incentive programs
Expert systems
34. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
ROT-13
Clipper Chip
Cyphertext only
Diffie-Hellman
35. Random Number Base
Script kiddies
Nonce
Bastion hosts
Asset Value
36. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
ALE (Annualized Loss Expectancy)
Audit Trail
Macro
Trojan horses
37. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
PKI
Open network
Finger printing
MOM
38. Network device that operates at layer 1. Concentrator.
PKI
Enticement
Hubs
Multitasking
39. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Covert channels
Expert systems
Fire extinguisher
ROT-13
40. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Object Oriented Programming
Degausser
Back door/ trap door/maintenance hook
Asymmetric
41. Public Key Infrastructure
IAB
PKI
Virtual machine
Salami Slicing
42. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Stream cipher
CIA
Mandatory vacation
Tort
43. A network that uses proprietary protocols
Call tree
MOM
/etc/passwd
Closed network
44. The real cost of acquiring/maintaining/developing a system
Inference
Hackers
Asset Value
Trap Door
45. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Inference
Virtual Memory/Pagefile.sys
Skipjack
Repeaters
46. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Logic bomb
Format 7 times
CHAP
Risk Management
47. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Aggregation
Smurf
War dialing
Birthday attack
48. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Probing
Accreditation
Transposition
Firewall types
49. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Debug
Echelon
Java
Raid 0 - 1 - 3 - 5
50. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
ROM (Read-only memory)
Rijndael
Cyphertext only
Copyright