Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






2. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






3. The real cost of acquiring/maintaining/developing a system






4. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






5. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






6. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






7. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






8. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






9. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






10. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






11. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






12. Threat to physical security.






13. An instance of a scripting language






14. More discriminate than dogs






15. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






16. Animals with teeth. Not as discriminate as guards






17. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






18. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






19. Once authenticated - the level of access you have to a system






20. A card that holds information that must be authenticated to before it can reveal the information that it is holding






21. The user






22. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






23. The art of breaking code. Testing the strength of an algorithm.






24. Personal - Network - and Application






25. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






26. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






27. Be at least 8 foot tall and have three strands of barbed wire.






28. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






29. After implementing countermeasures - accepting risk for the amount of vulnerability left over






30. A site that has some equipment in place - and can be up within days






31. Someone whose hacking is primarily targeted at the phone systems






32. A system designed to stop piggybacking.






33. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






34. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






35. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






36. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






37. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






38. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus






39. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






40. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






41. Emanations from one wire coupling with another wire






42. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






43. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






44. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






45. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






46. 'If you cant see it - its secure'. Bad policy to live by.






47. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






48. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






49. Repeats the signal. It amplifies the signal before sending it on.






50. Setting up the user to access the honeypot for reasons other than the intent to harm.