Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Motivational tools for employee awareness to get them to report security flaws in an organization






2. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






3. After implementing countermeasures - accepting risk for the amount of vulnerability left over






4. Involving the measurement of quantity or amount.






5. CISSPs subscribe to a code of ethics for building up the security profession






6. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






7. Public Key Infrastructure






8. Object Linking and Embedding. The ability of an object to be embedded into another object.






9. A sandbox. Emulates an operating environment.






10. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






11. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






12. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






13. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






14. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






15. A network entity that provides a single entrance / exit point to the Internet.






16. A network that mimics the brain






17. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






18. A mechanism by which connections to TCP services on a system are allowed or disallowed






19. The user






20. Chief Information Officer






21. Occupant Emergency Plan - Employees are the most important!






22. Someone who hacks






23. Method of authenticating to a system. Something that you supply and something you know.






24. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






25. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






26. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






27. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






28. Same as a block cipher except that it is applied to a data stream one bit at a time






29. Setting up the user to access the honeypot for reasons other than the intent to harm.






30. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






31. Also civil law






32. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.






33. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






34. Repeats the signal. It amplifies the signal before sending it on.






35. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






36. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






37. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






38. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.






39. Component Object Model.






40. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






41. Jumping into dumpsters to retrieve information about someone/something/a company






42. Chief Executive Officer






43. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






44. Someone whose hacking is primarily targeted at the phone systems






45. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






46. A site that is ready physically but has no hardware in place - all it has is HVAC






47. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






48. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






49. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.






50. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.