Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Random Number Base






2. A military standard defining controls for emanation protection






3. In the broadest sense - a fraud is a deception made for personal gain






4. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






5. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






6. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






7. Object Linking and Embedding. The ability of an object to be embedded into another object.






8. A network that uses standard protocols (TCP/IP)






9. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






10. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






11. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






12. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






13. Signal degradation as it moves farther from its source






14. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






15. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






16. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






17. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






18. The person that controls access to the data






19. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






20. Common Object Request Broker Architecture.






21. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






22. Personal - Network - and Application






23. Making individuals accountable for their actions on a system typically through the use of auditing






24. When two or more processes are linked and execute multiple programs simultaneously






25. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus






26. When security is managed at many different points in an organization






27. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.






28. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






29. Chief Executive Officer






30. Emanations from one wire coupling with another wire






31. These can be used to verify that public keys belong to certain individuals.






32. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






33. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






34. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






35. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






36. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.






37. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






38. Threat to physical security.






39. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






40. A network entity that provides a single entrance / exit point to the Internet.






41. Once authenticated - the level of access you have to a system






42. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






43. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






44. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list






45. A sandbox. Emulates an operating environment.






46. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






47. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






48. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






49. Also civil law






50. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests