Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






2. Data storage formats and equipment that allow the stored data to be accessed in any order






3. The person that controls access to the data






4. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






5. Method of authenticating to a system. Something that you supply and something you know.






6. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






7. A hidden communications channel on a system that allows for the bypassing of the system security policy






8. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






9. Network device that operates at layer 1. Concentrator.






10. Dynamic Host Configuration Protocol.






11. White hat l0pht






12. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






13. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






14. Repeats the signal. It amplifies the signal before sending it on.






15. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






16. Animals with teeth. Not as discriminate as guards






17. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






18. A war dialing utility






19. Occupant Emergency Plan - Employees are the most important!






20. Disclosure - Alteration - Destruction. These things break the CIA triad






21. Assuming someone's session who is unaware of what you are doing






22. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






23. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






24. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






25. A military standard defining controls for emanation protection






26. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






27. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






28. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






29. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






30. Something used to put out a fire. Can be in Classes A - B - C - D - or H






31. Confidentiality - Integrity - and Availability






32. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






33. A network entity that provides a single entrance / exit point to the Internet.






34. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






35. Object Linking and Embedding. The ability of an object to be embedded into another object.






36. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






37. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






38. Chief Executive Officer






39. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






40. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






41. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






42. The act of identifying yourself. Providing your identity to a system






43. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






44. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






45. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






46. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






47. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






48. Common Object Request Broker Architecture.






49. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






50. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests