Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In cryptography - it is a block cipher






2. Same as a block cipher except that it is applied to a data stream one bit at a time






3. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.






4. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






5. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






6. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






7. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






8. The process of reducing your risks to an acceptable level based on your risk analysis






9. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






10. A technique to eliminate data redundancy.






11. 'If you cant see it - its secure'. Bad policy to live by.






12. Method of authenticating to a system. Something that you supply and something you know.






13. In the broadest sense - a fraud is a deception made for personal gain






14. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






15. The frequency with which a threat is expected to occur.






16. Software designed to infiltrate or damage a computer system - without the owner's consent.






17. Disclosure - Alteration - Destruction. These things break the CIA triad






18. Personal - Network - and Application






19. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






20. Relating to quality or kind. This assigns a level of importance to something.






21. Internet Relay Chat.






22. The output of a hash function is a digest.






23. Must be in place for you to use a biometric system






24. Occupant Emergency Plan - Employees are the most important!






25. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






26. The intercepting of conversations by unintended recipients






27. Network devices that operate at layer 3. This device separates broadcast domains.






28. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters






29. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus






30. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






31. A network that mimics the brain






32. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.






33. Reasonable doubt






34. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






35. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






36. Network Address Translation






37. Chief Information Officer






38. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






39. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






40. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






41. The person that determines the permissions to files. The data owner.






42. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






43. Entails planning and system actions to ensure that a project is following good quality management practices






44. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






45. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






46. Something used to put out a fire. Can be in Classes A - B - C - D - or H






47. Also known as a tunnel)






48. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






49. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






50. Good for distance - longer than 100M