Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






2. White hat l0pht






3. Personal - Network - and Application






4. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






5. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






6. Providing verification to a system






7. Scanning the airwaves for radio transmissions






8. Reasonable doubt






9. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






10. A sandbox. Emulates an operating environment.






11. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






12. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






13. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






14. Chief Executive Officer






15. Network Address Translation






16. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






17. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






18. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






19. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.






20. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






21. A network entity that provides a single entrance / exit point to the Internet.






22. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






23. The ability to have more than one thread associated with a process






24. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






25. Software designed to infiltrate or damage a computer system - without the owner's consent.






26. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






27. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






28. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






29. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






30. 'If you cant see it - its secure'. Bad policy to live by.






31. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






32. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






33. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






34. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






35. Must be in place for you to use a biometric system






36. The user






37. A network that uses standard protocols (TCP/IP)






38. Accepting all packets






39. Internet Architecture Board. This board is responsible for protecting the Internet.






40. Network devices that operate at layer 2. Every port on a switch is a separate collision domain






41. An instance of a scripting language






42. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






43. Component Object Model.






44. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t






45. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






46. Assuming someone's session who is unaware of what you are doing






47. A network that uses proprietary protocols






48. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






49. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






50. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.