Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






2. Method of authenticating to a system. Something that you supply and something you know.






3. When security is managed at many different points in an organization






4. Internet Architecture Board. This board is responsible for protecting the Internet.






5. Confidentiality - Integrity - and Availability






6. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






7. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






8. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






9. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






10. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






11. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






12. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






13. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






14. A mechanism by which connections to TCP services on a system are allowed or disallowed






15. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






16. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






17. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






18. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.






19. A network entity that provides a single entrance / exit point to the Internet.






20. Basic Input/Output System






21. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






22. Involving the measurement of quantity or amount.






23. An instance of a scripting language






24. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






25. The user






26. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






27. Someone who hacks






28. Repeats the signal. It amplifies the signal before sending it on.






29. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






30. When one key of a two-key pair has more encryption pattern than the other






31. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






32. Public Key Infrastructure






33. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






34. Something used to put out a fire. Can be in Classes A - B - C - D - or H






35. Must be in place for you to use a biometric system






36. Relating to quality or kind. This assigns a level of importance to something.






37. The frequency with which a threat is expected to occur.






38. The art of breaking code. Testing the strength of an algorithm.






39. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






40. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






41. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






42. Ethernet - Cat5 - Twisted to allow for longer runs.






43. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






44. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






45. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






46. Continuation of Operations Plan






47. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






48. Distributed Component Object Model. Microsoft's implementation of CORBA.






49. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






50. Someone whose hacking is primarily targeted at the phone systems