Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






2. A site that has some equipment in place - and can be up within days






3. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






4. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






5. Dynamic Host Configuration Protocol.






6. Closed Circuit Television






7. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






8. Rolling command center with UPS - satellite - uplink - power - etc.






9. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






10. Someone whose hacking is primarily targeted at the phone systems






11. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






12. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






13. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






14. In cryptography - it is a block cipher






15. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






16. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






17. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






18. The practice of obtaining confidential information by manipulation of legitimate users.






19. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






20. The user






21. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.






22. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






23. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






24. The process of reducing your risks to an acceptable level based on your risk analysis






25. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






26. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






27. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






28. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






29. Repeats the signal. It amplifies the signal before sending it on.






30. More discriminate than dogs






31. Relating to quality or kind. This assigns a level of importance to something.






32. An instance of a scripting language






33. A network that mimics the brain






34. Disclosure - Alteration - Destruction. These things break the CIA triad






35. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






36. Internet Relay Chat.






37. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






38. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






39. Access control method for database based on the content of the database to provide granular access






40. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also






41. To not be legal (as far as law is concerned) or ethical






42. Defines the objects and their attributes that exist in a database.






43. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






44. When security is managed at many different points in an organization






45. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






46. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






47. Threat to physical security.






48. Method of authenticating to a system. Something that you supply and something you know.






49. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






50. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.