Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attempt to trick the system into believing that something false is real






2. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






3. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






4. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






5. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






6. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






7. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






8. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






9. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






10. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






11. A RFC standard. A mechanism for performing commands on a remote system






12. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






13. This is an open international standard for applications that use wireless communications.






14. Also civil law






15. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






16. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






17. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






18. Involving the measurement of quantity or amount.






19. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






20. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.






21. Distributed Component Object Model. Microsoft's implementation of CORBA.






22. Confidentiality - Integrity - and Availability






23. The frequency with which a threat is expected to occur.






24. Motivational tools for employee awareness to get them to report security flaws in an organization






25. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






26. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






27. The art of breaking code. Testing the strength of an algorithm.






28. Dynamic Host Configuration Protocol.






29. Encompasses Risk Analysis and Risk Mitigation






30. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






31. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






32. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






33. Be at least 8 foot tall and have three strands of barbed wire.






34. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






35. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






36. Network device that operates at layer 1. Concentrator.






37. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






38. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






39. A technique to eliminate data redundancy.






40. Using ICMP to diagram a network






41. Internet Relay Chat.






42. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






43. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






44. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






45. Network devices that operate at layer 3. This device separates broadcast domains.






46. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






47. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






48. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






49. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






50. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests