Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Distributed Component Object Model. Microsoft's implementation of CORBA.






2. Network Address Translation






3. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






4. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






5. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






6. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






7. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






8. Defines the objects and their attributes that exist in a database.






9. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






10. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






11. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






12. The art of breaking code. Testing the strength of an algorithm.






13. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






14. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






15. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc






16. Ethernet - Cat5 - Twisted to allow for longer runs.






17. More discriminate than dogs






18. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






19. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






20. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






21. A RFC standard. A mechanism for performing commands on a remote system






22. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






23. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






24. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






25. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






26. Making individuals accountable for their actions on a system typically through the use of auditing






27. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






28. The process of reducing your risks to an acceptable level based on your risk analysis






29. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






30. Also civil law






31. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






32. The user






33. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






34. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






35. Transferring your risk to someone else - typically an insurance company






36. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






37. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






38. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






39. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






40. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec






41. Access control method for database based on the content of the database to provide granular access






42. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






43. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






44. Closed Circuit Television






45. Good for distance - longer than 100M






46. The frequency with which a threat is expected to occur.






47. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






48. Computer Incident Response Team






49. When security is managed at many different points in an organization






50. Using ICMP to diagram a network







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests