Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network that mimics the brain






2. Repeats the signal. It amplifies the signal before sending it on.






3. Access control method for database based on the content of the database to provide granular access






4. A sandbox. Emulates an operating environment.






5. Motive - Opportunity - and Means. These deal with crime.






6. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






7. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec






8. Closed Circuit Television






9. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






10. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






11. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






12. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






13. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






14. The user






15. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






16. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






17. The act of identifying yourself. Providing your identity to a system






18. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






19. Relating to quality or kind. This assigns a level of importance to something.






20. Internet Relay Chat.






21. Also civil law






22. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






23. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






24. Object Linking and Embedding. The ability of an object to be embedded into another object.






25. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






26. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






27. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses






28. Emanations from one wire coupling with another wire






29. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






30. Scanning the airwaves for radio transmissions






31. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






32. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






33. The real cost of acquiring/maintaining/developing a system






34. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






35. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






36. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






37. When security is managed at many different points in an organization






38. A site that has some equipment in place - and can be up within days






39. An attempt to trick the system into believing that something false is real






40. Assuming someone's session who is unaware of what you are doing






41. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






42. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






43. Something used to put out a fire. Can be in Classes A - B - C - D - or H






44. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






45. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






46. Once authenticated - the level of access you have to a system






47. A technique to eliminate data redundancy.






48. A system designed to stop piggybacking.






49. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






50. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl