Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






2. Something used to put out a fire. Can be in Classes A - B - C - D - or H






3. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






4. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






5. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






6. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






7. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






8. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






9. Enticing people to hit your honeypot to see how they try to access your system.






10. Dynamic Host Configuration Protocol.






11. More discriminate than dogs






12. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






13. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






14. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.






15. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






16. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.






17. Scanning the airwaves for radio transmissions






18. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






19. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






20. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






21. Basic Input/Output System






22. 'If you cant see it - its secure'. Bad policy to live by.






23. Ethernet - Cat5 - Twisted to allow for longer runs.






24. Must be in place for you to use a biometric system






25. CISSPs subscribe to a code of ethics for building up the security profession






26. Threat to physical security.






27. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






28. A network that uses standard protocols (TCP/IP)






29. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






30. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






31. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






32. Public Key Infrastructure






33. An attempt to trick the system into believing that something false is real






34. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






35. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






36. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






37. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






38. Personal - Network - and Application






39. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






40. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






41. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






42. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






43. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






44. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters






45. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






46. Relating to quality or kind. This assigns a level of importance to something.






47. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






48. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






49. Internet Architecture Board. This board is responsible for protecting the Internet.






50. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests