Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






2. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






3. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






4. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






5. Encompasses Risk Analysis and Risk Mitigation






6. Computer Incident Response Team






7. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






8. Accepting all packets






9. Confidentiality - Integrity - and Availability






10. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






11. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






12. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






13. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






14. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.






15. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






16. The process of reducing your risks to an acceptable level based on your risk analysis






17. Animals with teeth. Not as discriminate as guards






18. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






19. Dynamic Host Configuration Protocol.






20. The output of a hash function is a digest.






21. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






22. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






23. The real cost of acquiring/maintaining/developing a system






24. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






25. Public Key Infrastructure






26. Internet Relay Chat.






27. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






28. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






29. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






30. Making individuals accountable for their actions on a system typically through the use of auditing






31. Providing verification to a system






32. A sandbox. Emulates an operating environment.






33. Chief Executive Officer






34. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






35. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






36. Closed Circuit Television






37. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






38. A network that uses standard protocols (TCP/IP)






39. Component Object Model.






40. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






41. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






42. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






43. Common Object Request Broker Architecture.






44. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






45. Network Address Translation






46. Threat to physical security.






47. Continuation of Operations Plan






48. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.






49. Distributed Component Object Model. Microsoft's implementation of CORBA.






50. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou