Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






2. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






3. The act of identifying yourself. Providing your identity to a system






4. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






5. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






6. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






7. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






8. Personal - Network - and Application






9. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






10. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






11. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






12. A mechanism by which connections to TCP services on a system are allowed or disallowed






13. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






14. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






15. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.






16. Closed Circuit Television






17. Network Address Translation






18. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






19. Method of authenticating to a system. Something that you supply and something you know.






20. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






21. A network entity that provides a single entrance / exit point to the Internet.






22. Chief Executive Officer






23. When two or more processes are linked and execute multiple programs simultaneously






24. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






25. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






26. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






27. Confidentiality - Integrity - and Availability






28. A war dialing utility






29. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






30. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






31. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






32. Software designed to infiltrate or damage a computer system - without the owner's consent.






33. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






34. Threat to physical security.






35. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






36. Motive - Opportunity - and Means. These deal with crime.






37. Accepting all packets






38. These can be used to verify that public keys belong to certain individuals.






39. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






40. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






41. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






42. 'If you cant see it - its secure'. Bad policy to live by.






43. CISSPs subscribe to a code of ethics for building up the security profession






44. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






45. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






46. Internet Architecture Board. This board is responsible for protecting the Internet.






47. Object Linking and Embedding. The ability of an object to be embedded into another object.






48. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






49. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






50. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.