Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






2. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






3. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






4. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






5. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






6. When security is managed at many different points in an organization






7. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






8. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






9. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






10. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






11. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






12. Animals with teeth. Not as discriminate as guards






13. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






14. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.






15. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






16. After implementing countermeasures - accepting risk for the amount of vulnerability left over






17. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






18. A RFC standard. A mechanism for performing commands on a remote system






19. Network device that operates at layer 1. Concentrator.






20. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






21. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






22. Transferring your risk to someone else - typically an insurance company






23. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






24. A technique to eliminate data redundancy.






25. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






26. Be at least 8 foot tall and have three strands of barbed wire.






27. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






28. A hidden communications channel on a system that allows for the bypassing of the system security policy






29. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






30. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






31. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






32. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






33. Relating to quality or kind. This assigns a level of importance to something.






34. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






35. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






36. Computer Incident Response Team






37. Internet Architecture Board. This board is responsible for protecting the Internet.






38. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






39. Software designed to infiltrate or damage a computer system - without the owner's consent.






40. When two or more processes are linked and execute multiple programs simultaneously






41. Component Object Model.






42. Someone whose hacking is primarily targeted at the phone systems






43. Repeats the signal. It amplifies the signal before sending it on.






44. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list






45. Scanning the airwaves for radio transmissions






46. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






47. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






48. A site that is ready physically but has no hardware in place - all it has is HVAC






49. Confidentiality - Integrity - and Availability






50. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.