Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






2. Animals with teeth. Not as discriminate as guards






3. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






4. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






5. Something used to put out a fire. Can be in Classes A - B - C - D - or H






6. Rolling command center with UPS - satellite - uplink - power - etc.






7. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.






8. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






9. A site that has some equipment in place - and can be up within days






10. The ability to have more than one thread associated with a process






11. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.






12. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






13. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






14. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






15. A military standard defining controls for emanation protection






16. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






17. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






18. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






19. Confidentiality - Integrity - and Availability






20. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






21. 'If you cant see it - its secure'. Bad policy to live by.






22. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






23. A sandbox. Emulates an operating environment.






24. In the broadest sense - a fraud is a deception made for personal gain






25. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






26. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus






27. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






28. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






29. The user






30. Entails planning and system actions to ensure that a project is following good quality management practices






31. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.






32. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






33. Also known as a tunnel)






34. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






35. The art of breaking code. Testing the strength of an algorithm.






36. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.






37. Must be in place for you to use a biometric system






38. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






39. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






40. When security is managed at many different points in an organization






41. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






42. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






43. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






44. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






45. The person that determines the permissions to files. The data owner.






46. These viruses usually infect both boot records and files.






47. More discriminate than dogs






48. Chief Executive Officer






49. Once authenticated - the level of access you have to a system






50. The real cost of acquiring/maintaining/developing a system