Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






2. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






3. Encompasses Risk Analysis and Risk Mitigation






4. Public Key Infrastructure






5. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






6. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






7. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






8. These can be used to verify that public keys belong to certain individuals.






9. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






10. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






11. Common Object Request Broker Architecture.






12. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






13. A military standard defining controls for emanation protection






14. Random Number Base






15. Once authenticated - the level of access you have to a system






16. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






17. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






18. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.






19. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






20. Signal degradation as it moves farther from its source






21. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






22. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






23. A mechanism by which connections to TCP services on a system are allowed or disallowed






24. Be at least 8 foot tall and have three strands of barbed wire.






25. Someone whose hacking is primarily targeted at the phone systems






26. Network device that operates at layer 1. Concentrator.






27. Data storage formats and equipment that allow the stored data to be accessed in any order






28. Relating to quality or kind. This assigns a level of importance to something.






29. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






30. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






31. When two or more processes are linked and execute multiple programs simultaneously






32. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






33. A gas used in fire suppression. Not human safe. Chemical reaction.






34. The frequency with which a threat is expected to occur.






35. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






36. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






37. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






38. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






39. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






40. These viruses usually infect both boot records and files.






41. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






42. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






43. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






44. A card that holds information that must be authenticated to before it can reveal the information that it is holding






45. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






46. The output of a hash function is a digest.






47. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






48. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.






49. Object Linking and Embedding. The ability of an object to be embedded into another object.






50. Component Object Model.