Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Access control method for database based on the content of the database to provide granular access






2. This is an open international standard for applications that use wireless communications.






3. Basic Input/Output System






4. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






5. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






6. Enticing people to hit your honeypot to see how they try to access your system.






7. A card that holds information that must be authenticated to before it can reveal the information that it is holding






8. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






9. Providing verification to a system






10. Entails planning and system actions to ensure that a project is following good quality management practices






11. When one key of a two-key pair has more encryption pattern than the other






12. A gas used in fire suppression. Not human safe. Chemical reaction.






13. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






14. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






15. Confidentiality - Integrity - and Availability






16. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






17. Also civil law






18. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters






19. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






20. These viruses usually infect both boot records and files.






21. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






22. Internet Architecture Board. This board is responsible for protecting the Internet.






23. When security is managed at many different points in an organization






24. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






25. More discriminate than dogs






26. Dynamic Host Configuration Protocol.






27. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






28. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






29. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.






30. Ethernet - Cat5 - Twisted to allow for longer runs.






31. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






32. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






33. Threat to physical security.






34. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






35. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






36. A mechanism by which connections to TCP services on a system are allowed or disallowed






37. A network that mimics the brain






38. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






39. Distributed Component Object Model. Microsoft's implementation of CORBA.






40. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






41. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






42. The intercepting of conversations by unintended recipients






43. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






44. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






45. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






46. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






47. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






48. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






49. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






50. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests