Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is an open international standard for applications that use wireless communications.






2. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






3. The act of identifying yourself. Providing your identity to a system






4. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






5. A network that uses standard protocols (TCP/IP)






6. Same as a block cipher except that it is applied to a data stream one bit at a time






7. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






8. The practice of following someone with a security code or keycard through a security door - generally in workplaces.






9. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






10. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






11. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






12. Confidentiality - Integrity - and Availability






13. A RFC standard. A mechanism for performing commands on a remote system






14. Assuming someone's session who is unaware of what you are doing






15. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






16. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






17. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






18. A sandbox. Emulates an operating environment.






19. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






20. The intercepting of conversations by unintended recipients






21. The output of a hash function is a digest.






22. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






23. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






24. 'If you cant see it - its secure'. Bad policy to live by.






25. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






26. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






27. Be at least 8 foot tall and have three strands of barbed wire.






28. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






29. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






30. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






31. Threat to physical security.






32. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






33. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






34. Common Object Request Broker Architecture.






35. A site that has some equipment in place - and can be up within days






36. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






37. White hat l0pht






38. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






39. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






40. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






41. When security is managed at many different points in an organization






42. Good for distance - longer than 100M






43. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






44. Disclosure - Alteration - Destruction. These things break the CIA triad






45. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






46. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






47. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






48. A mechanism by which connections to TCP services on a system are allowed or disallowed






49. Providing verification to a system






50. A network entity that provides a single entrance / exit point to the Internet.