Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






2. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






3. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






4. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






5. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






6. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






7. When security is managed at many different points in an organization






8. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






9. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






10. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






11. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






12. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






13. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






14. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






15. Good for distance - longer than 100M






16. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






17. These can be used to verify that public keys belong to certain individuals.






18. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






19. Something used to put out a fire. Can be in Classes A - B - C - D - or H






20. Method of authenticating to a system. Something that you supply and something you know.






21. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






22. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






23. Also known as a tunnel)






24. Access control method for database based on the content of the database to provide granular access






25. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






26. Emanations from one wire coupling with another wire






27. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






28. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






29. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t






30. A RFC standard. A mechanism for performing commands on a remote system






31. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






32. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






33. Public Key Infrastructure






34. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






35. Continuation of Operations Plan






36. Threat to physical security.






37. These viruses usually infect both boot records and files.






38. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






39. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






40. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






41. The person that determines the permissions to files. The data owner.






42. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






43. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






44. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






45. Network devices that operate at layer 3. This device separates broadcast domains.






46. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






47. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






48. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






49. Chief Executive Officer






50. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.