Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Motivational tools for employee awareness to get them to report security flaws in an organization






2. Component Object Model.






3. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.






4. After implementing countermeasures - accepting risk for the amount of vulnerability left over






5. In cryptography - it is a block cipher






6. These can be used to verify that public keys belong to certain individuals.






7. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






8. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






9. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






10. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






11. Confidentiality - Integrity - and Availability






12. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






13. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






14. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






15. Encompasses Risk Analysis and Risk Mitigation






16. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






17. Method of authenticating to a system. Something that you supply and something you know.






18. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






19. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






20. Something used to put out a fire. Can be in Classes A - B - C - D - or H






21. Relating to quality or kind. This assigns a level of importance to something.






22. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






23. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






24. Internet Architecture Board. This board is responsible for protecting the Internet.






25. Providing verification to a system






26. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses






27. An instance of a scripting language






28. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also






29. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






30. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






31. The intercepting of conversations by unintended recipients






32. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






33. A gas used in fire suppression. Not human safe. Chemical reaction.






34. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






35. A sandbox. Emulates an operating environment.






36. Assuming someone's session who is unaware of what you are doing






37. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






38. Chief Executive Officer






39. A military standard defining controls for emanation protection






40. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






41. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






42. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






43. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






44. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






45. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






46. Closed Circuit Television






47. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






48. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






49. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






50. Enticing people to hit your honeypot to see how they try to access your system.