Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The frequency with which a threat is expected to occur.






2. Chief Executive Officer






3. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






4. Data storage formats and equipment that allow the stored data to be accessed in any order






5. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






6. Ethernet - Cat5 - Twisted to allow for longer runs.






7. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






8. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






9. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






10. Someone who hacks






11. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






12. Using ICMP to diagram a network






13. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






14. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






15. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






16. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






17. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






18. A site that is ready physically but has no hardware in place - all it has is HVAC






19. Also known as a tunnel)






20. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






21. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






22. Computer Incident Response Team






23. Someone whose hacking is primarily targeted at the phone systems






24. Encompasses Risk Analysis and Risk Mitigation






25. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






26. Motivational tools for employee awareness to get them to report security flaws in an organization






27. Good for distance - longer than 100M






28. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






29. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






30. Animals with teeth. Not as discriminate as guards






31. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






32. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






33. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






34. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






35. A network that uses proprietary protocols






36. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






37. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






38. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






39. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






40. Relating to quality or kind. This assigns a level of importance to something.






41. An attempt to trick the system into believing that something false is real






42. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






43. More discriminate than dogs






44. After implementing countermeasures - accepting risk for the amount of vulnerability left over






45. Must be in place for you to use a biometric system






46. In the broadest sense - a fraud is a deception made for personal gain






47. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






48. Threat to physical security.






49. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






50. When security is managed at many different points in an organization