Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.






2. Someone whose hacking is primarily targeted at the phone systems






3. In a separation of duties model - this is where code is checked in and out






4. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






5. Scanning the airwaves for radio transmissions






6. Animals with teeth. Not as discriminate as guards






7. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






8. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






9. In cryptography - it is a block cipher






10. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






11. This is an open international standard for applications that use wireless communications.






12. After implementing countermeasures - accepting risk for the amount of vulnerability left over






13. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






14. Dialing fixed sets telephone numbers looking for open modem connections to machines






15. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






16. The practice of following someone with a security code or keycard through a security door - generally in workplaces.






17. An attempt to trick the system into believing that something false is real






18. A mechanism by which connections to TCP services on a system are allowed or disallowed






19. Threat to physical security.






20. Defines the objects and their attributes that exist in a database.






21. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






22. A military standard defining controls for emanation protection






23. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






24. Providing verification to a system






25. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






26. When security is managed at many different points in an organization






27. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






28. Chief Information Officer






29. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






30. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






31. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






32. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






33. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






34. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






35. Ethernet - Cat5 - Twisted to allow for longer runs.






36. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






37. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






38. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






39. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






40. Chief Executive Officer






41. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






42. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






43. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






44. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






45. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






46. Disclosure - Alteration - Destruction. These things break the CIA triad






47. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






48. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






49. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






50. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.