Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






2. A system designed to stop piggybacking.






3. Occupant Emergency Plan - Employees are the most important!






4. Network devices that operate at layer 2. Every port on a switch is a separate collision domain






5. Continuation of Operations Plan






6. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






7. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






8. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






9. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






10. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






11. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also






12. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






13. Component Object Model.






14. These can be used to verify that public keys belong to certain individuals.






15. A site that is ready physically but has no hardware in place - all it has is HVAC






16. The frequency with which a threat is expected to occur.






17. 'If you cant see it - its secure'. Bad policy to live by.






18. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






19. In a separation of duties model - this is where code is checked in and out






20. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






21. Personal - Network - and Application






22. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






23. A gas used in fire suppression. Not human safe. Chemical reaction.






24. Entails planning and system actions to ensure that a project is following good quality management practices






25. Must be in place for you to use a biometric system






26. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






27. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






28. Basic Input/Output System






29. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






30. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






31. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






32. The output of a hash function is a digest.






33. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






34. Object Linking and Embedding. The ability of an object to be embedded into another object.






35. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






36. To not be legal (as far as law is concerned) or ethical






37. Rolling command center with UPS - satellite - uplink - power - etc.






38. Public Key Infrastructure






39. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






40. An attempt to trick the system into believing that something false is real






41. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






42. Disclosure - Alteration - Destruction. These things break the CIA triad






43. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.






44. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






45. Involving the measurement of quantity or amount.






46. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






47. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






48. Motivational tools for employee awareness to get them to report security flaws in an organization






49. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






50. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.