Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






2. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






3. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






4. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






5. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






6. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






7. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






8. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






9. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






10. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






11. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






12. A site that has some equipment in place - and can be up within days






13. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






14. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






15. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






16. Once authenticated - the level of access you have to a system






17. Internet Relay Chat.






18. Closed Circuit Television






19. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






20. Continuation of Operations Plan






21. CISSPs subscribe to a code of ethics for building up the security profession






22. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






23. A mechanism by which connections to TCP services on a system are allowed or disallowed






24. When two or more processes are linked and execute multiple programs simultaneously






25. The practice of obtaining confidential information by manipulation of legitimate users.






26. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






27. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






28. When security is managed at many different points in an organization






29. When one key of a two-key pair has more encryption pattern than the other






30. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






31. Be at least 8 foot tall and have three strands of barbed wire.






32. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






33. The output of a hash function is a digest.






34. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






35. Relating to quality or kind. This assigns a level of importance to something.






36. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






37. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






38. Entails planning and system actions to ensure that a project is following good quality management practices






39. An attempt to trick the system into believing that something false is real






40. A hidden communications channel on a system that allows for the bypassing of the system security policy






41. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






42. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






43. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






44. Providing verification to a system






45. Network devices that operate at layer 3. This device separates broadcast domains.






46. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






47. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






48. The process of reducing your risks to an acceptable level based on your risk analysis






49. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






50. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.