Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A card that holds information that must be authenticated to before it can reveal the information that it is holding






2. The person that determines the permissions to files. The data owner.






3. Internet Architecture Board. This board is responsible for protecting the Internet.






4. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






5. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






6. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






7. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






8. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.






9. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






10. A system designed to stop piggybacking.






11. An instance of a scripting language






12. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






13. Emanations from one wire coupling with another wire






14. Involving the measurement of quantity or amount.






15. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






16. Continuation of Operations Plan






17. These can be used to verify that public keys belong to certain individuals.






18. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






19. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






20. Repeats the signal. It amplifies the signal before sending it on.






21. Reasonable doubt






22. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






23. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






24. Network devices that operate at layer 3. This device separates broadcast domains.






25. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






26. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






27. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






28. Same as a block cipher except that it is applied to a data stream one bit at a time






29. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






30. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






31. In the broadest sense - a fraud is a deception made for personal gain






32. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






33. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






34. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






35. Good for distance - longer than 100M






36. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






37. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






38. Chief Information Officer






39. The process of reducing your risks to an acceptable level based on your risk analysis






40. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






41. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






42. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






43. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






44. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.






45. Public Key Infrastructure






46. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






47. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






48. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc






49. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






50. Internet Relay Chat.