Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






2. The act of identifying yourself. Providing your identity to a system






3. A hidden communications channel on a system that allows for the bypassing of the system security policy






4. Rolling command center with UPS - satellite - uplink - power - etc.






5. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






6. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






7. Personal - Network - and Application






8. A site that is ready physically but has no hardware in place - all it has is HVAC






9. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






10. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list






11. Reasonable doubt






12. Chief Information Officer






13. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






14. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






15. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






16. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






17. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






18. Same as a block cipher except that it is applied to a data stream one bit at a time






19. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






20. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






21. Public Key Infrastructure






22. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






23. Motive - Opportunity - and Means. These deal with crime.






24. Also civil law






25. Involving the measurement of quantity or amount.






26. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






27. In a separation of duties model - this is where code is checked in and out






28. Data storage formats and equipment that allow the stored data to be accessed in any order






29. Random Number Base






30. Enticing people to hit your honeypot to see how they try to access your system.






31. Internet Architecture Board. This board is responsible for protecting the Internet.






32. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






33. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






34. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






35. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






36. Dynamic Host Configuration Protocol.






37. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






38. The art of breaking code. Testing the strength of an algorithm.






39. A RFC standard. A mechanism for performing commands on a remote system






40. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






41. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






42. Once authenticated - the level of access you have to a system






43. Emanations from one wire coupling with another wire






44. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






45. The frequency with which a threat is expected to occur.






46. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






47. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






48. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






49. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






50. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.