Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






2. Using ICMP to diagram a network






3. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






4. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






5. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






6. Occupant Emergency Plan - Employees are the most important!






7. When two or more processes are linked and execute multiple programs simultaneously






8. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






9. Relating to quality or kind. This assigns a level of importance to something.






10. Motive - Opportunity - and Means. These deal with crime.






11. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






12. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






13. A RFC standard. A mechanism for performing commands on a remote system






14. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






15. Public Key Infrastructure






16. Be at least 8 foot tall and have three strands of barbed wire.






17. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






18. Internet Architecture Board. This board is responsible for protecting the Internet.






19. Involving the measurement of quantity or amount.






20. Emanations from one wire coupling with another wire






21. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






22. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






23. Signal degradation as it moves farther from its source






24. Encompasses Risk Analysis and Risk Mitigation






25. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






26. A sandbox. Emulates an operating environment.






27. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






28. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.






29. Data storage formats and equipment that allow the stored data to be accessed in any order






30. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






31. Object Linking and Embedding. The ability of an object to be embedded into another object.






32. Dynamic Host Configuration Protocol.






33. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






34. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






35. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






36. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






37. Ethernet - Cat5 - Twisted to allow for longer runs.






38. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






39. When one key of a two-key pair has more encryption pattern than the other






40. Software designed to infiltrate or damage a computer system - without the owner's consent.






41. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






42. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






43. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






44. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






45. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






46. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






47. Component Object Model.






48. Someone whose hacking is primarily targeted at the phone systems






49. A network that uses standard protocols (TCP/IP)






50. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable