Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






2. Chief Executive Officer






3. The output of a hash function is a digest.






4. CISSPs subscribe to a code of ethics for building up the security profession






5. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






6. Dialing fixed sets telephone numbers looking for open modem connections to machines






7. Someone who hacks






8. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.






9. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






10. The person that determines the permissions to files. The data owner.






11. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.






12. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






13. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.






14. Jumping into dumpsters to retrieve information about someone/something/a company






15. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






16. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






17. Public Key Infrastructure






18. The ability to have more than one thread associated with a process






19. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






20. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






21. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






22. More discriminate than dogs






23. A card that holds information that must be authenticated to before it can reveal the information that it is holding






24. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






25. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






26. The act of identifying yourself. Providing your identity to a system






27. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






28. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






29. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






30. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






31. Animals with teeth. Not as discriminate as guards






32. Computer Incident Response Team






33. Occupant Emergency Plan - Employees are the most important!






34. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






35. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






36. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






37. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






38. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






39. In a separation of duties model - this is where code is checked in and out






40. Also civil law






41. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






42. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






43. A war dialing utility






44. The user






45. Be at least 8 foot tall and have three strands of barbed wire.






46. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






47. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc






48. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






49. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






50. When two or more processes are linked and execute multiple programs simultaneously







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests