Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Jumping into dumpsters to retrieve information about someone/something/a company






2. The person that determines the permissions to files. The data owner.






3. More discriminate than dogs






4. In a separation of duties model - this is where code is checked in and out






5. The intercepting of conversations by unintended recipients






6. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






7. A military standard defining controls for emanation protection






8. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






9. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.






10. Signal degradation as it moves farther from its source






11. A war dialing utility






12. A network that uses standard protocols (TCP/IP)






13. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






14. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






15. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






16. A network that uses proprietary protocols






17. Something used to put out a fire. Can be in Classes A - B - C - D - or H






18. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






19. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






20. Occupant Emergency Plan - Employees are the most important!






21. Network Address Translation






22. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






23. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






24. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






25. Assuming someone's session who is unaware of what you are doing






26. A network that mimics the brain






27. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






28. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






29. Dynamic Host Configuration Protocol.






30. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






31. These viruses usually infect both boot records and files.






32. The process of reducing your risks to an acceptable level based on your risk analysis






33. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






34. A sandbox. Emulates an operating environment.






35. Also known as a tunnel)






36. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






37. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






38. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






39. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






40. Repeats the signal. It amplifies the signal before sending it on.






41. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






42. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






43. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






44. Relating to quality or kind. This assigns a level of importance to something.






45. After implementing countermeasures - accepting risk for the amount of vulnerability left over






46. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






47. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






48. Component Object Model.






49. Chief Information Officer






50. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.