Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A military standard defining controls for emanation protection






2. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






3. A gas used in fire suppression. Not human safe. Chemical reaction.






4. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






5. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






6. Animals with teeth. Not as discriminate as guards






7. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






8. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






9. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus






10. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






11. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






12. Assuming someone's session who is unaware of what you are doing






13. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






14. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






15. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






16. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






17. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






18. A RFC standard. A mechanism for performing commands on a remote system






19. This is an open international standard for applications that use wireless communications.






20. The frequency with which a threat is expected to occur.






21. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






22. A network entity that provides a single entrance / exit point to the Internet.






23. Signal degradation as it moves farther from its source






24. In cryptography - it is a block cipher






25. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses






26. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






27. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






28. Personal - Network - and Application






29. In a separation of duties model - this is where code is checked in and out






30. Computer Incident Response Team






31. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






32. A card that holds information that must be authenticated to before it can reveal the information that it is holding






33. Closed Circuit Television






34. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






35. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






36. Confidentiality - Integrity - and Availability






37. A technique to eliminate data redundancy.






38. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






39. Jumping into dumpsters to retrieve information about someone/something/a company






40. Transferring your risk to someone else - typically an insurance company






41. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






42. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






43. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






44. A site that has some equipment in place - and can be up within days






45. In the broadest sense - a fraud is a deception made for personal gain






46. Emanations from one wire coupling with another wire






47. An attempt to trick the system into believing that something false is real






48. Encompasses Risk Analysis and Risk Mitigation






49. Software designed to infiltrate or damage a computer system - without the owner's consent.






50. Something used to put out a fire. Can be in Classes A - B - C - D - or H







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests