Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






2. A site that is ready physically but has no hardware in place - all it has is HVAC






3. The person that determines the permissions to files. The data owner.






4. Internet Architecture Board. This board is responsible for protecting the Internet.






5. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






6. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






7. Disclosure - Alteration - Destruction. These things break the CIA triad






8. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






9. A network that uses proprietary protocols






10. The art of breaking code. Testing the strength of an algorithm.






11. Chief Executive Officer






12. Entails planning and system actions to ensure that a project is following good quality management practices






13. Accepting all packets






14. A mechanism by which connections to TCP services on a system are allowed or disallowed






15. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






16. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






17. Animals with teeth. Not as discriminate as guards






18. CISSPs subscribe to a code of ethics for building up the security profession






19. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






20. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






21. A hidden communications channel on a system that allows for the bypassing of the system security policy






22. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






23. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






24. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






25. A gas used in fire suppression. Not human safe. Chemical reaction.






26. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






27. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






28. Data storage formats and equipment that allow the stored data to be accessed in any order






29. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






30. Repeats the signal. It amplifies the signal before sending it on.






31. Threat to physical security.






32. Motivational tools for employee awareness to get them to report security flaws in an organization






33. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






34. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






35. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






36. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






37. Someone who hacks






38. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






39. The user






40. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






41. Chief Information Officer






42. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






43. To not be legal (as far as law is concerned) or ethical






44. Ethernet - Cat5 - Twisted to allow for longer runs.






45. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






46. The frequency with which a threat is expected to occur.






47. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






48. Signal degradation as it moves farther from its source






49. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






50. Using ICMP to diagram a network