Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Internet Architecture Board. This board is responsible for protecting the Internet.






2. Disclosure - Alteration - Destruction. These things break the CIA triad






3. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






4. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






5. A site that has some equipment in place - and can be up within days






6. Threat to physical security.






7. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






8. Network Address Translation






9. A network that uses standard protocols (TCP/IP)






10. Occupant Emergency Plan - Employees are the most important!






11. Be at least 8 foot tall and have three strands of barbed wire.






12. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






13. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






14. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






15. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






16. Access control method for database based on the content of the database to provide granular access






17. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






18. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






19. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






20. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






21. In cryptography - it is a block cipher






22. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






23. Network devices that operate at layer 3. This device separates broadcast domains.






24. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






25. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






26. A RFC standard. A mechanism for performing commands on a remote system






27. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






28. When security is managed at many different points in an organization






29. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






30. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






31. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






32. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






33. Defines the objects and their attributes that exist in a database.






34. Accepting all packets






35. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






36. Good for distance - longer than 100M






37. An instance of a scripting language






38. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






39. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






40. The person that determines the permissions to files. The data owner.






41. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






42. When two or more processes are linked and execute multiple programs simultaneously






43. Encompasses Risk Analysis and Risk Mitigation






44. To not be legal (as far as law is concerned) or ethical






45. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






46. Closed Circuit Television






47. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






48. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






49. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters






50. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests