Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






2. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






3. The intercepting of conversations by unintended recipients






4. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






5. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






6. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






7. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






8. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






9. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






10. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






11. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






12. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






13. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






14. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






15. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






16. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.






17. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






18. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






19. Public Key Infrastructure






20. Animals with teeth. Not as discriminate as guards






21. Emanations from one wire coupling with another wire






22. Component Object Model.






23. Scanning the airwaves for radio transmissions






24. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.






25. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






26. Entails planning and system actions to ensure that a project is following good quality management practices






27. A technique to eliminate data redundancy.






28. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.






29. CISSPs subscribe to a code of ethics for building up the security profession






30. Random Number Base






31. A network that mimics the brain






32. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






33. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






34. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






35. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






36. The frequency with which a threat is expected to occur.






37. Assuming someone's session who is unaware of what you are doing






38. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






39. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






40. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






41. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






42. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






43. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






44. Confidentiality - Integrity - and Availability






45. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






46. Someone whose hacking is primarily targeted at the phone systems






47. When security is managed at a central point in an organization






48. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






49. Something used to put out a fire. Can be in Classes A - B - C - D - or H






50. Distributed Component Object Model. Microsoft's implementation of CORBA.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests