Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






2. These can be used to verify that public keys belong to certain individuals.






3. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






4. 'If you cant see it - its secure'. Bad policy to live by.






5. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






6. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






7. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






8. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






9. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






10. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






11. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






12. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






13. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






14. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






15. The person that controls access to the data






16. Public Key Infrastructure






17. Occupant Emergency Plan - Employees are the most important!






18. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.






19. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






20. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






21. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






22. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






23. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






24. Animals with teeth. Not as discriminate as guards






25. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






26. Once authenticated - the level of access you have to a system






27. Signal degradation as it moves farther from its source






28. A network that uses proprietary protocols






29. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






30. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






31. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






32. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






33. Rolling command center with UPS - satellite - uplink - power - etc.






34. An instance of a scripting language






35. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






36. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






37. A network that uses standard protocols (TCP/IP)






38. Be at least 8 foot tall and have three strands of barbed wire.






39. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






40. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






41. Same as a block cipher except that it is applied to a data stream one bit at a time






42. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






43. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






44. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






45. The ability to have more than one thread associated with a process






46. To not be legal (as far as law is concerned) or ethical






47. In cryptography - it is a block cipher






48. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






49. A sandbox. Emulates an operating environment.






50. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests