Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






2. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






3. Chief Information Officer






4. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






5. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






6. A network that uses proprietary protocols






7. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






8. Dialing fixed sets telephone numbers looking for open modem connections to machines






9. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus






10. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






11. An instance of a scripting language






12. Access control method for database based on the content of the database to provide granular access






13. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






14. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






15. The output of a hash function is a digest.






16. When two or more processes are linked and execute multiple programs simultaneously






17. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






18. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






19. The practice of obtaining confidential information by manipulation of legitimate users.






20. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






21. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






22. Something used to put out a fire. Can be in Classes A - B - C - D - or H






23. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






24. Good for distance - longer than 100M






25. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






26. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






27. Network devices that operate at layer 3. This device separates broadcast domains.






28. A RFC standard. A mechanism for performing commands on a remote system






29. The art of breaking code. Testing the strength of an algorithm.






30. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






31. Defines the objects and their attributes that exist in a database.






32. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






33. Encompasses Risk Analysis and Risk Mitigation






34. A network that uses standard protocols (TCP/IP)






35. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






36. A network entity that provides a single entrance / exit point to the Internet.






37. Public Key Infrastructure






38. Relating to quality or kind. This assigns a level of importance to something.






39. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






40. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






41. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






42. Chief Executive Officer






43. To not be legal (as far as law is concerned) or ethical






44. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t






45. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






46. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






47. Closed Circuit Television






48. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






49. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






50. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.