Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Encompasses Risk Analysis and Risk Mitigation






2. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






3. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






4. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






5. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






6. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






7. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






8. Reasonable doubt






9. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






10. A war dialing utility






11. Signal degradation as it moves farther from its source






12. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






13. Method of authenticating to a system. Something that you supply and something you know.






14. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






15. Scanning the airwaves for radio transmissions






16. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






17. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






18. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






19. The ability to have more than one thread associated with a process






20. Accepting all packets






21. Once authenticated - the level of access you have to a system






22. Someone who hacks






23. Confidentiality - Integrity - and Availability






24. Making individuals accountable for their actions on a system typically through the use of auditing






25. A site that is ready physically but has no hardware in place - all it has is HVAC






26. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






27. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






28. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






29. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






30. A network entity that provides a single entrance / exit point to the Internet.






31. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






32. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






33. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






34. Same as a block cipher except that it is applied to a data stream one bit at a time






35. Object Linking and Embedding. The ability of an object to be embedded into another object.






36. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






37. Jumping into dumpsters to retrieve information about someone/something/a company






38. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






39. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






40. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






41. A network that mimics the brain






42. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






43. Chief Information Officer






44. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






45. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






46. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






47. Must be in place for you to use a biometric system






48. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






49. 'If you cant see it - its secure'. Bad policy to live by.






50. The intercepting of conversations by unintended recipients