Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Assuming someone's session who is unaware of what you are doing






2. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






3. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






4. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






5. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






6. These can be used to verify that public keys belong to certain individuals.






7. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






8. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






9. Continuation of Operations Plan






10. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






11. The art of breaking code. Testing the strength of an algorithm.






12. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






13. The output of a hash function is a digest.






14. A network that mimics the brain






15. Something used to put out a fire. Can be in Classes A - B - C - D - or H






16. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






17. After implementing countermeasures - accepting risk for the amount of vulnerability left over






18. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






19. Entails planning and system actions to ensure that a project is following good quality management practices






20. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






21. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






22. A sandbox. Emulates an operating environment.






23. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






24. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






25. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






26. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






27. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.






28. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






29. Making individuals accountable for their actions on a system typically through the use of auditing






30. Internet Architecture Board. This board is responsible for protecting the Internet.






31. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






32. The person that determines the permissions to files. The data owner.






33. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






34. A card that holds information that must be authenticated to before it can reveal the information that it is holding






35. Data storage formats and equipment that allow the stored data to be accessed in any order






36. When security is managed at many different points in an organization






37. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.






38. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






39. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






40. Object Linking and Embedding. The ability of an object to be embedded into another object.






41. The frequency with which a threat is expected to occur.






42. An instance of a scripting language






43. Encompasses Risk Analysis and Risk Mitigation






44. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






45. Network devices that operate at layer 3. This device separates broadcast domains.






46. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






47. Component Object Model.






48. When two or more processes are linked and execute multiple programs simultaneously






49. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






50. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.