SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
DDOS
/etc/passwd
IAB
Key Escrow
2. Data storage formats and equipment that allow the stored data to be accessed in any order
RAM (Random-access memory)
Incentive programs
Degausser
Certification
3. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Vulnerability analysis tools
Script kiddies
Substitution
ISDN (Integrated Services Digital Network)
4. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Due Care
Separation of duties
AES (Advanced Encryption Standard)
Authorization
5. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
Hackers
Hubs
Risk Management
SSO (Single sign-on)
6. 'If you cant see it - its secure'. Bad policy to live by.
Asymmetric
Closed network
Security through obscurity
Normalization
7. Internet Architecture Board. This board is responsible for protecting the Internet.
IAB
Debug
Risk Mitigation
Dumpster diving
8. Accepting all packets
TCSEC
Stream cipher
Sniffing
Promiscuous mode
9. Enticing people to hit your honeypot to see how they try to access your system.
TEMPEST
OSI Model
Enticement
Biometrics
10. Same as a block cipher except that it is applied to a data stream one bit at a time
Stream cipher
Switches / Bridges
Brute force
Acceptable use
11. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
TCSEC
Entrapment
Promiscuous mode
CHAP
12. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Callback Security/Call Forwarding
User
Encryption
ALE (Annualized Loss Expectancy)
13. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Out of band
ROT-13
Cyphertext only
Tokens
14. The act of identifying yourself. Providing your identity to a system
Asymmetric
Identification
Risk Management
Accountability
15. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Base-64
WTLS (Wireless Transport Layer Security)
Degausser
Software
16. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Security Awareness Training
Fire extinguisher
Clipper Chip
Accountability
17. The output of a hash function is a digest.
CEO
Digest
Raid 0 - 1 - 3 - 5
Service packs
18. Ethernet - Cat5 - Twisted to allow for longer runs.
Out of band
Data remanence
Smurf
Twisted pair
19. CISSPs subscribe to a code of ethics for building up the security profession
Code of ethics
Authorization creep
CRC (Cyclic Redundancy Check)
Crosstalk
20. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Debug
Acceptable use
Diffie-Hellman
Nonce
21. Network device that operates at layer 1. Concentrator.
Owner
Hubs
Call tree
Checksum
22. Setting up the user to access the honeypot for reasons other than the intent to harm.
IRC
Hardware
Entrapment
Accountability
23. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Rijndael
Scanning
PKI
Multiprocessing
24. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Authentication
Hoax
DAD
Trade Secret
25. Must be in place for you to use a biometric system
Data remanence
Aggregation
TCP Wrappers
Biometric profile
26. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
SSO (Single sign-on)
Active attacks
Smurf
MOM
27. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
CRC (Cyclic Redundancy Check)
Brute force
Diffie-Hellman
Clipping levels
28. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Security Awareness Training
WTLS (Wireless Transport Layer Security)
Guards
Two-Factor Authentication
29. A gas used in fire suppression. Not human safe. Chemical reaction.
Halon
Birthday attack
Sniffing
Granularity
30. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
/etc/passwd
Cyphertext only
Raid 0 - 1 - 3 - 5
Routers
31. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
SSO (Single sign-on)
Carnivore
Session Hijacking
Promiscuous mode
32. Component Object Model.
Certification
COM
OEP
Noise & perturbation
33. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Buffer overflow
l0pht
Patent
Trap Door
34. White hat l0pht
Data Mart
Bugtraq
Stream cipher
Biometrics
35. Someone who hacks
Carnivore
Brewer-Nash model
CCTV
Hacker
36. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Clipper Chip
Buffer overflow
Biometric profile
SSL/TLS
37. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
CRC (Cyclic Redundancy Check)
RADIUS (Remote authentication dial-in user service)
Hoax
Private Addressing
38. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
War driving
Substitution
Firmware
Throughput of a Biometric System
39. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
SSH
CCTV
Routers
Penetration testing
40. Method of authenticating to a system. Something that you supply and something you know.
Senior Management
Username/password
Macro
Base-64
41. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Block cipher
Eavesdropping
Audit Trail
CIA
42. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
UUEncode
Spoofing
Honey pot
Logic bomb
43. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
Fiber optic
Routers
Enticement
ISDN (Integrated Services Digital Network)
44. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Data remanence
Trademark
Caesar Cipher
Bastion hosts
45. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Fraud
Polymorphism
Reciprocal agreement
Granularity
46. Disclosure - Alteration - Destruction. These things break the CIA triad
/etc/passwd
Polymorphism
Out of band
DAD
47. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Sniffing
Reciprocal agreement
Session Hijacking
Trap Door
48. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Cookies
Nonce
AES (Advanced Encryption Standard)
Cryptanalysis
49. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Hot Site
Incentive programs
Substitution
Noise & perturbation
50. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Schema
Logic bomb
Object Oriented Programming
Firmware
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests