Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Accepting all packets






2. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






3. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






4. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






5. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






6. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






7. A system designed to stop piggybacking.






8. Also known as a tunnel)






9. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






10. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






11. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






12. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






13. Public Key Infrastructure






14. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






15. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






16. Data storage formats and equipment that allow the stored data to be accessed in any order






17. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






18. Using ICMP to diagram a network






19. Random Number Base






20. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






21. A hidden communications channel on a system that allows for the bypassing of the system security policy






22. Method of authenticating to a system. Something that you supply and something you know.






23. A site that is ready physically but has no hardware in place - all it has is HVAC






24. Jumping into dumpsters to retrieve information about someone/something/a company






25. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






26. 'If you cant see it - its secure'. Bad policy to live by.






27. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






28. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






29. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






30. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses






31. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






32. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






33. Chief Executive Officer






34. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






35. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






36. A site that has some equipment in place - and can be up within days






37. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






38. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






39. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






40. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






41. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






42. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






43. When security is managed at a central point in an organization






44. Once authenticated - the level of access you have to a system






45. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






46. The real cost of acquiring/maintaining/developing a system






47. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






48. Encompasses Risk Analysis and Risk Mitigation






49. The user






50. Be at least 8 foot tall and have three strands of barbed wire.