Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The intercepting of conversations by unintended recipients






2. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical






3. Network Address Translation






4. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






5. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






6. Personal - Network - and Application






7. A site that is ready physically but has no hardware in place - all it has is HVAC






8. Someone who hacks






9. The ability to have more than one thread associated with a process






10. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






11. After implementing countermeasures - accepting risk for the amount of vulnerability left over






12. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






13. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






14. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






15. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






16. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






17. Encompasses Risk Analysis and Risk Mitigation






18. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






19. Good for distance - longer than 100M






20. A RFC standard. A mechanism for performing commands on a remote system






21. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






22. Signal degradation as it moves farther from its source






23. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.






24. Making individuals accountable for their actions on a system typically through the use of auditing






25. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






26. A mechanism by which connections to TCP services on a system are allowed or disallowed






27. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






28. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






29. Jumping into dumpsters to retrieve information about someone/something/a company






30. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






31. The frequency with which a threat is expected to occur.






32. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






33. Someone whose hacking is primarily targeted at the phone systems






34. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






35. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






36. A sandbox. Emulates an operating environment.






37. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






38. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






39. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






40. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






41. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list






42. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






43. Animals with teeth. Not as discriminate as guards






44. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






45. Component Object Model.






46. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.






47. Network devices that operate at layer 2. Every port on a switch is a separate collision domain






48. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters






49. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






50. Access control method for database based on the content of the database to provide granular access