Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






2. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






3. An attempt to trick the system into believing that something false is real






4. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






5. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






6. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






7. The act of identifying yourself. Providing your identity to a system






8. To not be legal (as far as law is concerned) or ethical






9. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






10. Signal degradation as it moves farther from its source






11. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






12. Animals with teeth. Not as discriminate as guards






13. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






14. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






15. Chief Information Officer






16. The real cost of acquiring/maintaining/developing a system






17. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






18. Relating to quality or kind. This assigns a level of importance to something.






19. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






20. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






21. 'If you cant see it - its secure'. Bad policy to live by.






22. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






23. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






24. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






25. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






26. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






27. Something used to put out a fire. Can be in Classes A - B - C - D - or H






28. Making individuals accountable for their actions on a system typically through the use of auditing






29. Chief Executive Officer






30. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






31. Emanations from one wire coupling with another wire






32. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






33. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






34. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






35. The person that determines the permissions to files. The data owner.






36. Public Key Infrastructure






37. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






38. Method of authenticating to a system. Something that you supply and something you know.






39. Access control method for database based on the content of the database to provide granular access






40. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec






41. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






42. The intercepting of conversations by unintended recipients






43. White hat l0pht






44. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus






45. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






46. A site that has some equipment in place - and can be up within days






47. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






48. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






49. Reasonable doubt






50. Transferring your risk to someone else - typically an insurance company