Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When security is managed at many different points in an organization






2. A network that uses proprietary protocols






3. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc






4. A site that is ready physically but has no hardware in place - all it has is HVAC






5. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






6. Relating to quality or kind. This assigns a level of importance to something.






7. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.






8. A hidden communications channel on a system that allows for the bypassing of the system security policy






9. A network entity that provides a single entrance / exit point to the Internet.






10. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






11. White hat l0pht






12. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






13. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






14. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






15. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






16. Method of authenticating to a system. Something that you supply and something you know.






17. Be at least 8 foot tall and have three strands of barbed wire.






18. Making individuals accountable for their actions on a system typically through the use of auditing






19. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






20. Data storage formats and equipment that allow the stored data to be accessed in any order






21. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






22. A network that mimics the brain






23. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






24. A network that uses standard protocols (TCP/IP)






25. The user






26. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






27. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






28. Component Object Model.






29. Once authenticated - the level of access you have to a system






30. Scanning the airwaves for radio transmissions






31. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






32. A site that has some equipment in place - and can be up within days






33. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






34. When two or more processes are linked and execute multiple programs simultaneously






35. The real cost of acquiring/maintaining/developing a system






36. Defines the objects and their attributes that exist in a database.






37. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






38. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






39. A card that holds information that must be authenticated to before it can reveal the information that it is holding






40. Someone who hacks






41. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






42. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






43. Providing verification to a system






44. Confidentiality - Integrity - and Availability






45. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






46. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






47. A war dialing utility






48. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






49. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






50. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c