Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When two or more processes are linked and execute multiple programs simultaneously






2. The real cost of acquiring/maintaining/developing a system






3. Defines the objects and their attributes that exist in a database.






4. More discriminate than dogs






5. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses






6. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






7. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






8. Someone whose hacking is primarily targeted at the phone systems






9. Closed Circuit Television






10. Something used to put out a fire. Can be in Classes A - B - C - D - or H






11. A network entity that provides a single entrance / exit point to the Internet.






12. A card that holds information that must be authenticated to before it can reveal the information that it is holding






13. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






14. Once authenticated - the level of access you have to a system






15. After implementing countermeasures - accepting risk for the amount of vulnerability left over






16. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






17. Setting up the user to access the honeypot for reasons other than the intent to harm.






18. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






19. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






20. The practice of obtaining confidential information by manipulation of legitimate users.






21. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.






22. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






23. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






24. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.






25. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






26. Public Key Infrastructure






27. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






28. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






29. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






30. Also known as a tunnel)






31. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






32. Ethernet - Cat5 - Twisted to allow for longer runs.






33. Basic Input/Output System






34. The user






35. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






36. Enticing people to hit your honeypot to see how they try to access your system.






37. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.






38. Network Address Translation






39. Dialing fixed sets telephone numbers looking for open modem connections to machines






40. Threat to physical security.






41. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






42. The person that controls access to the data






43. When security is managed at many different points in an organization






44. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






45. The process of reducing your risks to an acceptable level based on your risk analysis






46. Personal - Network - and Application






47. This is an open international standard for applications that use wireless communications.






48. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






49. White hat l0pht






50. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests