Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Motivational tools for employee awareness to get them to report security flaws in an organization






2. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






3. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






4. Providing verification to a system






5. Scanning the airwaves for radio transmissions






6. In the broadest sense - a fraud is a deception made for personal gain






7. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






8. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






9. 'If you cant see it - its secure'. Bad policy to live by.






10. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






11. Emanations from one wire coupling with another wire






12. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






13. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






14. Repeats the signal. It amplifies the signal before sending it on.






15. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






16. The act of identifying yourself. Providing your identity to a system






17. Threat to physical security.






18. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






19. Closed Circuit Television






20. An instance of a scripting language






21. The real cost of acquiring/maintaining/developing a system






22. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






23. Network Address Translation






24. Confidentiality - Integrity - and Availability






25. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






26. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






27. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






28. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






29. Assuming someone's session who is unaware of what you are doing






30. Something used to put out a fire. Can be in Classes A - B - C - D - or H






31. A network that mimics the brain






32. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






33. Ethernet - Cat5 - Twisted to allow for longer runs.






34. The user






35. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






36. When two or more processes are linked and execute multiple programs simultaneously






37. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






38. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






39. More discriminate than dogs






40. To not be legal (as far as law is concerned) or ethical






41. An attempt to trick the system into believing that something false is real






42. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






43. Good for distance - longer than 100M






44. Chief Executive Officer






45. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






46. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






47. This is an open international standard for applications that use wireless communications.






48. Reasonable doubt






49. A mechanism by which connections to TCP services on a system are allowed or disallowed






50. False Acceptance Rate - False Rejection Rate - Crossover Error Rate