Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.






2. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






3. Chief Information Officer






4. The frequency with which a threat is expected to occur.






5. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






6. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






7. When one key of a two-key pair has more encryption pattern than the other






8. In the broadest sense - a fraud is a deception made for personal gain






9. Setting up the user to access the honeypot for reasons other than the intent to harm.






10. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






11. Motive - Opportunity - and Means. These deal with crime.






12. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec






13. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






14. Component Object Model.






15. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






16. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






17. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also






18. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






19. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






20. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.






21. The person that controls access to the data






22. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






23. Internet Relay Chat.






24. A network that uses standard protocols (TCP/IP)






25. Using ICMP to diagram a network






26. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






27. Once authenticated - the level of access you have to a system






28. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






29. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






30. Good for distance - longer than 100M






31. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






32. Access control method for database based on the content of the database to provide granular access






33. Repeats the signal. It amplifies the signal before sending it on.






34. Something used to put out a fire. Can be in Classes A - B - C - D - or H






35. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.






36. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






37. A network entity that provides a single entrance / exit point to the Internet.






38. The intercepting of conversations by unintended recipients






39. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






40. A mechanism by which connections to TCP services on a system are allowed or disallowed






41. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






42. The practice of obtaining confidential information by manipulation of legitimate users.






43. Someone who hacks






44. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






45. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






46. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






47. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






48. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






49. Disclosure - Alteration - Destruction. These things break the CIA triad






50. The output of a hash function is a digest.