Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A mechanism by which connections to TCP services on a system are allowed or disallowed






2. A sandbox. Emulates an operating environment.






3. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






4. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.






5. Someone whose hacking is primarily targeted at the phone systems






6. Using ICMP to diagram a network






7. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list






8. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






9. An attempt to trick the system into believing that something false is real






10. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






11. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






12. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






13. Access control method for database based on the content of the database to provide granular access






14. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






15. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






16. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






17. An instance of a scripting language






18. Reasonable doubt






19. A RFC standard. A mechanism for performing commands on a remote system






20. Closed Circuit Television






21. These viruses usually infect both boot records and files.






22. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






23. CISSPs subscribe to a code of ethics for building up the security profession






24. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






25. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






26. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus






27. Dynamic Host Configuration Protocol.






28. Network devices that operate at layer 3. This device separates broadcast domains.






29. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






30. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






31. Common Object Request Broker Architecture.






32. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






33. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






34. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






35. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






36. After implementing countermeasures - accepting risk for the amount of vulnerability left over






37. Once authenticated - the level of access you have to a system






38. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






39. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






40. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






41. These can be used to verify that public keys belong to certain individuals.






42. Animals with teeth. Not as discriminate as guards






43. Entails planning and system actions to ensure that a project is following good quality management practices






44. Emanations from one wire coupling with another wire






45. Computer Incident Response Team






46. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






47. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






48. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






49. To not be legal (as far as law is concerned) or ethical






50. The person that controls access to the data






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests