Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






2. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






3. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






4. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






5. The user






6. In the broadest sense - a fraud is a deception made for personal gain






7. Continuation of Operations Plan






8. Motive - Opportunity - and Means. These deal with crime.






9. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






10. Basic Input/Output System






11. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






12. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






13. Good for distance - longer than 100M






14. Confidentiality - Integrity - and Availability






15. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






16. Same as a block cipher except that it is applied to a data stream one bit at a time






17. Involving the measurement of quantity or amount.






18. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






19. Something used to put out a fire. Can be in Classes A - B - C - D - or H






20. Public Key Infrastructure






21. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






22. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






23. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






24. Jumping into dumpsters to retrieve information about someone/something/a company






25. A network entity that provides a single entrance / exit point to the Internet.






26. A war dialing utility






27. A technique to eliminate data redundancy.






28. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






29. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






30. Dialing fixed sets telephone numbers looking for open modem connections to machines






31. A network that uses standard protocols (TCP/IP)






32. Be at least 8 foot tall and have three strands of barbed wire.






33. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.






34. This is an open international standard for applications that use wireless communications.






35. The real cost of acquiring/maintaining/developing a system






36. A site that is ready physically but has no hardware in place - all it has is HVAC






37. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






38. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






39. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.






40. Random Number Base






41. After implementing countermeasures - accepting risk for the amount of vulnerability left over






42. Rolling command center with UPS - satellite - uplink - power - etc.






43. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






44. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






45. The process of reducing your risks to an acceptable level based on your risk analysis






46. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc






47. CISSPs subscribe to a code of ethics for building up the security profession






48. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






49. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






50. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp