Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These viruses usually infect both boot records and files.






2. Also known as a tunnel)






3. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.






4. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






5. To not be legal (as far as law is concerned) or ethical






6. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






7. Internet Architecture Board. This board is responsible for protecting the Internet.






8. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






9. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






10. These can be used to verify that public keys belong to certain individuals.






11. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list






12. When security is managed at a central point in an organization






13. A network that uses standard protocols (TCP/IP)






14. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc






15. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






16. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






17. Be at least 8 foot tall and have three strands of barbed wire.






18. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






19. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






20. A sandbox. Emulates an operating environment.






21. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






22. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






23. The intercepting of conversations by unintended recipients






24. A system designed to stop piggybacking.






25. When two or more processes are linked and execute multiple programs simultaneously






26. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






27. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






28. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






29. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






30. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters






31. A card that holds information that must be authenticated to before it can reveal the information that it is holding






32. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






33. Motivational tools for employee awareness to get them to report security flaws in an organization






34. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






35. Random Number Base






36. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






37. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






38. Network device that operates at layer 1. Concentrator.






39. Something used to put out a fire. Can be in Classes A - B - C - D - or H






40. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






41. Public Key Infrastructure






42. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






43. A network that uses proprietary protocols






44. The real cost of acquiring/maintaining/developing a system






45. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






46. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






47. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






48. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






49. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






50. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.