Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






2. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






3. Computer Incident Response Team






4. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






5. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






6. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






7. The art of breaking code. Testing the strength of an algorithm.






8. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






9. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






10. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.






11. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






12. The output of a hash function is a digest.






13. Also known as a tunnel)






14. Repeats the signal. It amplifies the signal before sending it on.






15. Dialing fixed sets telephone numbers looking for open modem connections to machines






16. Software designed to infiltrate or damage a computer system - without the owner's consent.






17. A technique to eliminate data redundancy.






18. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






19. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






20. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






21. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






22. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.






23. Scanning the airwaves for radio transmissions






24. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






25. The real cost of acquiring/maintaining/developing a system






26. Random Number Base






27. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






28. Animals with teeth. Not as discriminate as guards






29. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






30. A network that uses standard protocols (TCP/IP)






31. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






32. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






33. An attempt to trick the system into believing that something false is real






34. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






35. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






36. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






37. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






38. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






39. Dynamic Host Configuration Protocol.






40. Enticing people to hit your honeypot to see how they try to access your system.






41. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






42. The frequency with which a threat is expected to occur.






43. The person that controls access to the data






44. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






45. Once authenticated - the level of access you have to a system






46. Involving the measurement of quantity or amount.






47. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.






48. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






49. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






50. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests