Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Disclosure - Alteration - Destruction. These things break the CIA triad






2. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






3. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






4. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






5. Also known as a tunnel)






6. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






7. Distributed Component Object Model. Microsoft's implementation of CORBA.






8. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






9. Dialing fixed sets telephone numbers looking for open modem connections to machines






10. Accepting all packets






11. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






12. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.






13. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






14. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






15. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






16. The process of reducing your risks to an acceptable level based on your risk analysis






17. These viruses usually infect both boot records and files.






18. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






19. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






20. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






21. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.






22. The real cost of acquiring/maintaining/developing a system






23. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






24. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






25. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






26. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






27. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






28. Something used to put out a fire. Can be in Classes A - B - C - D - or H






29. The user






30. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






31. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






32. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






33. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.






34. Dynamic Host Configuration Protocol.






35. Animals with teeth. Not as discriminate as guards






36. A network that uses standard protocols (TCP/IP)






37. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






38. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






39. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






40. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






41. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc






42. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






43. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






44. The frequency with which a threat is expected to occur.






45. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






46. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






47. Setting up the user to access the honeypot for reasons other than the intent to harm.






48. Personal - Network - and Application






49. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






50. Rolling command center with UPS - satellite - uplink - power - etc.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests