Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Also known as a tunnel)






2. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






3. Network devices that operate at layer 3. This device separates broadcast domains.






4. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






5. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






6. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






7. Assuming someone's session who is unaware of what you are doing






8. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






9. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






10. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






11. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






12. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






13. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






14. Basic Input/Output System






15. A site that has some equipment in place - and can be up within days






16. More discriminate than dogs






17. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






18. The ability to have more than one thread associated with a process






19. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






20. Once authenticated - the level of access you have to a system






21. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






22. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






23. Same as a block cipher except that it is applied to a data stream one bit at a time






24. Ethernet - Cat5 - Twisted to allow for longer runs.






25. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






26. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






27. A network that mimics the brain






28. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






29. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






30. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






31. Accepting all packets






32. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






33. White hat l0pht






34. Scanning the airwaves for radio transmissions






35. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






36. Confidentiality - Integrity - and Availability






37. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






38. Computer Incident Response Team






39. Encompasses Risk Analysis and Risk Mitigation






40. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






41. Common Object Request Broker Architecture.






42. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






43. Chief Information Officer






44. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






45. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.






46. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.






47. Internet Relay Chat.






48. In cryptography - it is a block cipher






49. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






50. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests