Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Be at least 8 foot tall and have three strands of barbed wire.






2. Something used to put out a fire. Can be in Classes A - B - C - D - or H






3. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






4. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






5. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






6. The person that determines the permissions to files. The data owner.






7. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






8. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






9. A network that mimics the brain






10. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






11. Continuation of Operations Plan






12. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






13. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






14. Network devices that operate at layer 3. This device separates broadcast domains.






15. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






16. Reasonable doubt






17. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






18. Motive - Opportunity - and Means. These deal with crime.






19. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






20. Someone whose hacking is primarily targeted at the phone systems






21. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






22. Dynamic Host Configuration Protocol.






23. The act of identifying yourself. Providing your identity to a system






24. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






25. Enticing people to hit your honeypot to see how they try to access your system.






26. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






27. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






28. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






29. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






30. An instance of a scripting language






31. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






32. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






33. A site that has some equipment in place - and can be up within days






34. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






35. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






36. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






37. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






38. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






39. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






40. The practice of following someone with a security code or keycard through a security door - generally in workplaces.






41. Random Number Base






42. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters






43. The frequency with which a threat is expected to occur.






44. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






45. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






46. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






47. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






48. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






49. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






50. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message