SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Enticing people to hit your honeypot to see how they try to access your system.
Digital certificates
Multipartite
Enticement
OSI Model
2. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Service packs
Out of band
Cold Site
Copyright
3. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
ALE (Annualized Loss Expectancy)
Owner
Caesar Cipher
Job rotation
4. Accepting all packets
Promiscuous mode
TACACS (Terminal access controller access control system)
Accountability
Inference
5. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
DMZ
Polymorphism
Job rotation
Patriot Act
6. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
VPN (Virtual Private Network)
Motion detector
Sniffing
Hacker
7. White hat l0pht
Bugtraq
Quantitative
SQL (Structured Query Language)
ROT-13
8. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
COM
ARP (Address Resolution Protocol)
Patriot Act
Authorization
9. Using ICMP to diagram a network
Probing
PAP (Password Authentication Protocol)
Risk Management
Authorization creep
10. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Wiretapping
Termination procedures
Trojan horses
Buffer overflow
11. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
War driving
Clipping levels
Base-64
Passive attacks
12. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
War dialing
Skipjack
Virtual Memory/Pagefile.sys
War driving
13. A hidden communications channel on a system that allows for the bypassing of the system security policy
Covert channels
SESAME
TACACS (Terminal access controller access control system)
Warm Site
14. The person that determines the permissions to files. The data owner.
Entrapment
Polymorphic
Inference
Owner
15. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
SSH
CGI (The Common Gateway Interface)
Diffie-Hellman
Mandatory vacation
16. An instance of a scripting language
Private Addressing
Wiretapping
Script
Out of band
17. Object Linking and Embedding. The ability of an object to be embedded into another object.
Motion detector
Vulnerability analysis tools
OLE
Covert channels
18. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Hash
Diffie-Hellman
Trap Door
Boot-sector Virus
19. Common Object Request Broker Architecture.
CORBA
Virtual machine
Two-Factor Authentication
Finger printing
20. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Rolling hot sites
Dictionary Attack
Accountability
Rijndael
21. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
WTLS (Wireless Transport Layer Security)
Sabotage
Security kernel
Caesar Cipher
22. The art of breaking code. Testing the strength of an algorithm.
Cryptanalysis
Due Diligence
Normalization
DNS cache poisoning
23. Ethernet - Cat5 - Twisted to allow for longer runs.
User
Twisted pair
Script
Clipping levels
24. Be at least 8 foot tall and have three strands of barbed wire.
Cyphertext only
Hot Site
Rijndael
Fences
25. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Back door/ trap door/maintenance hook
Owner
Script
CORBA
26. Data storage formats and equipment that allow the stored data to be accessed in any order
RAM (Random-access memory)
Hubs
Halon
IAB
27. When one key of a two-key pair has more encryption pattern than the other
Active attacks
Exit interview
Asymmetric
Diffie-Hellman
28. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Private Addressing
AES (Advanced Encryption Standard)
Firewall types
VPN (Virtual Private Network)
29. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Risk Transferring
Mandatory vacation
Finger scanning
Symmetric
30. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Due Care
Open network
Hash
Risk Transferring
31. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
DOS
SLE (Single Loss Expectancy or Exposure)
COOP
Virtual Memory/Pagefile.sys
32. When two or more processes are linked and execute multiple programs simultaneously
Asymmetric
Authentication
Classes of IP networks
Multiprocessing
33. Component Object Model.
Hacker
Hardware
Session Hijacking
COM
34. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
CRC (Cyclic Redundancy Check)
Finger scanning
Rolling hot sites
RADIUS (Remote authentication dial-in user service)
35. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Clipper Chip
Coax
Qualitative
Throughput of a Biometric System
36. Threat to physical security.
Due Diligence
Sabotage
Smart cards
Raid 0 - 1 - 3 - 5
37. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
RADIUS (Remote authentication dial-in user service)
Out of band
DCOM
Polymorphism
38. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Closed network
BIA
Penetration testing
ISDN (Integrated Services Digital Network)
39. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Call tree
Trojan horses
ActiveX Object Linking and Embedding
Data Mart
40. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
OEP
Smurf
Skipjack
CIO
41. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Private Addressing
Expert System
Logic bomb
AES (Advanced Encryption Standard)
42. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Illegal/Unethical
Decentralized
CIO
Rijndael
43. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
CIRT
OSI Model
Enticement
Biometrics
44. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Finger printing
Security Perimeter
Biometric profile
VLANs
45. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Non-repudiation
Clipping levels
Embezzlement
Macro
46. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Non-repudiation
Switches / Bridges
Coax
Cyphertext only
47. Emanations from one wire coupling with another wire
Open network
Change management
Crosstalk
Polymorphism
48. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
CRC (Cyclic Redundancy Check)
Degausser
DNS cache poisoning
SQL (Structured Query Language)
49. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Routers
Detective - Preventive - Corrective
Out of band
Brewer-Nash model
50. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Hardware
Illegal/Unethical
Out of band
Phreaker