Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






2. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






3. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






4. A war dialing utility






5. Network device that operates at layer 1. Concentrator.






6. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






7. Scanning the airwaves for radio transmissions






8. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






9. A system designed to stop piggybacking.






10. Signal degradation as it moves farther from its source






11. Relating to quality or kind. This assigns a level of importance to something.






12. Also known as a tunnel)






13. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






14. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






15. To not be legal (as far as law is concerned) or ethical






16. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






17. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






18. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






19. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






20. A military standard defining controls for emanation protection






21. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






22. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






23. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






24. Involving the measurement of quantity or amount.






25. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






26. Dynamic Host Configuration Protocol.






27. Access control method for database based on the content of the database to provide granular access






28. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






29. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






30. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






31. Network devices that operate at layer 2. Every port on a switch is a separate collision domain






32. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






33. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






34. Making individuals accountable for their actions on a system typically through the use of auditing






35. Common Object Request Broker Architecture.






36. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.






37. A mechanism by which connections to TCP services on a system are allowed or disallowed






38. Ethernet - Cat5 - Twisted to allow for longer runs.






39. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






40. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






41. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






42. Someone whose hacking is primarily targeted at the phone systems






43. Someone who hacks






44. A site that has some equipment in place - and can be up within days






45. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






46. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






47. This is an open international standard for applications that use wireless communications.






48. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






49. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






50. When one key of a two-key pair has more encryption pattern than the other







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests