Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






2. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






3. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






4. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






5. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






6. Data storage formats and equipment that allow the stored data to be accessed in any order






7. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






8. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






9. When security is managed at a central point in an organization






10. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






11. The output of a hash function is a digest.






12. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






13. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






14. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






15. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






16. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.






17. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






18. The process of reducing your risks to an acceptable level based on your risk analysis






19. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






20. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






21. Personal - Network - and Application






22. Reasonable doubt






23. When two or more processes are linked and execute multiple programs simultaneously






24. A network entity that provides a single entrance / exit point to the Internet.






25. The intercepting of conversations by unintended recipients






26. Signal degradation as it moves farther from its source






27. Once authenticated - the level of access you have to a system






28. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






29. In cryptography - it is a block cipher






30. Public Key Infrastructure






31. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






32. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






33. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






34. These viruses usually infect both boot records and files.






35. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






36. A network that mimics the brain






37. Object Linking and Embedding. The ability of an object to be embedded into another object.






38. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.






39. The act of identifying yourself. Providing your identity to a system






40. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






41. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






42. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






43. Network Address Translation






44. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






45. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






46. A war dialing utility






47. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






48. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






49. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






50. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests