Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. After implementing countermeasures - accepting risk for the amount of vulnerability left over






2. When security is managed at a central point in an organization






3. Software designed to infiltrate or damage a computer system - without the owner's consent.






4. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






5. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






6. Continuation of Operations Plan






7. Internet Relay Chat.






8. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






9. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






10. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






11. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.






12. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






13. The person that determines the permissions to files. The data owner.






14. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






15. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.






16. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






17. A site that has some equipment in place - and can be up within days






18. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






19. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






20. Must be in place for you to use a biometric system






21. The intercepting of conversations by unintended recipients






22. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus






23. Random Number Base






24. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






25. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






26. Involving the measurement of quantity or amount.






27. Motive - Opportunity - and Means. These deal with crime.






28. Someone whose hacking is primarily targeted at the phone systems






29. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






30. A network that mimics the brain






31. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






32. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






33. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






34. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






35. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






36. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






37. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






38. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t






39. Network devices that operate at layer 3. This device separates broadcast domains.






40. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






41. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






42. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






43. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






44. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






45. Network device that operates at layer 1. Concentrator.






46. Computer Incident Response Team






47. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






48. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






49. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






50. Chief Executive Officer