Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






2. More discriminate than dogs






3. Motive - Opportunity - and Means. These deal with crime.






4. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






5. Same as a block cipher except that it is applied to a data stream one bit at a time






6. A network that mimics the brain






7. The art of breaking code. Testing the strength of an algorithm.






8. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






9. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






10. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






11. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






12. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






13. The person that determines the permissions to files. The data owner.






14. Encompasses Risk Analysis and Risk Mitigation






15. A sandbox. Emulates an operating environment.






16. Public Key Infrastructure






17. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






18. Random Number Base






19. Personal - Network - and Application






20. A network entity that provides a single entrance / exit point to the Internet.






21. Relating to quality or kind. This assigns a level of importance to something.






22. Assuming someone's session who is unaware of what you are doing






23. When two or more processes are linked and execute multiple programs simultaneously






24. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






25. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






26. The act of identifying yourself. Providing your identity to a system






27. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






28. Closed Circuit Television






29. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






30. Software designed to infiltrate or damage a computer system - without the owner's consent.






31. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.






32. Motivational tools for employee awareness to get them to report security flaws in an organization






33. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.






34. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






35. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






36. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






37. Confidentiality - Integrity - and Availability






38. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






39. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






40. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






41. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






42. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






43. Common Object Request Broker Architecture.






44. Computer Incident Response Team






45. To not be legal (as far as law is concerned) or ethical






46. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.






47. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






48. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






49. Continuation of Operations Plan






50. The person that controls access to the data