Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Object Linking and Embedding. The ability of an object to be embedded into another object.






2. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






3. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






4. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






5. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






6. To not be legal (as far as law is concerned) or ethical






7. A gas used in fire suppression. Not human safe. Chemical reaction.






8. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






9. Distributed Component Object Model. Microsoft's implementation of CORBA.






10. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






11. Chief Executive Officer






12. A sandbox. Emulates an operating environment.






13. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






14. The intercepting of conversations by unintended recipients






15. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






16. The act of identifying yourself. Providing your identity to a system






17. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






18. Providing verification to a system






19. Data storage formats and equipment that allow the stored data to be accessed in any order






20. A military standard defining controls for emanation protection






21. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






22. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






23. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






24. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






25. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






26. A technique to eliminate data redundancy.






27. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.






28. Network devices that operate at layer 3. This device separates broadcast domains.






29. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






30. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






31. A network that uses standard protocols (TCP/IP)






32. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






33. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






34. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






35. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






36. Network device that operates at layer 1. Concentrator.






37. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






38. A network that mimics the brain






39. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






40. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






41. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






42. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






43. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






44. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






45. Component Object Model.






46. Emanations from one wire coupling with another wire






47. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






48. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.






49. Basic Input/Output System






50. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests