Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






2. Random Number Base






3. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






4. A mechanism by which connections to TCP services on a system are allowed or disallowed






5. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






6. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






7. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






8. Enticing people to hit your honeypot to see how they try to access your system.






9. The intercepting of conversations by unintended recipients






10. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






11. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






12. An attempt to trick the system into believing that something false is real






13. A military standard defining controls for emanation protection






14. The person that controls access to the data






15. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






16. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






17. Network device that operates at layer 1. Concentrator.






18. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






19. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






20. A network that uses proprietary protocols






21. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






22. Involving the measurement of quantity or amount.






23. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






24. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






25. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






26. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






27. Also civil law






28. The output of a hash function is a digest.






29. Motive - Opportunity - and Means. These deal with crime.






30. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






31. Occupant Emergency Plan - Employees are the most important!






32. Rolling command center with UPS - satellite - uplink - power - etc.






33. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






34. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






35. To not be legal (as far as law is concerned) or ethical






36. When security is managed at many different points in an organization






37. The real cost of acquiring/maintaining/developing a system






38. Dynamic Host Configuration Protocol.






39. Ethernet - Cat5 - Twisted to allow for longer runs.






40. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






41. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






42. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






43. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.






44. Chief Information Officer






45. The user






46. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also






47. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






48. Disclosure - Alteration - Destruction. These things break the CIA triad






49. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






50. Network devices that operate at layer 3. This device separates broadcast domains.