Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






2. When two or more processes are linked and execute multiple programs simultaneously






3. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






4. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






5. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






6. To not be legal (as far as law is concerned) or ethical






7. The intercepting of conversations by unintended recipients






8. Closed Circuit Television






9. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






10. White hat l0pht






11. Enticing people to hit your honeypot to see how they try to access your system.






12. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.






13. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






14. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters






15. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






16. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






17. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.






18. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






19. The art of breaking code. Testing the strength of an algorithm.






20. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






21. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






22. In the broadest sense - a fraud is a deception made for personal gain






23. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






24. Random Number Base






25. Good for distance - longer than 100M






26. Animals with teeth. Not as discriminate as guards






27. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






28. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






29. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






30. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






31. Rolling command center with UPS - satellite - uplink - power - etc.






32. Basic Input/Output System






33. A network that uses standard protocols (TCP/IP)






34. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






35. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






36. Someone who hacks






37. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






38. This is an open international standard for applications that use wireless communications.






39. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






40. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






41. A gas used in fire suppression. Not human safe. Chemical reaction.






42. Something used to put out a fire. Can be in Classes A - B - C - D - or H






43. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






44. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.






45. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






46. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






47. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






48. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






49. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






50. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec