Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Repeats the signal. It amplifies the signal before sending it on.






2. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






3. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






4. A network that mimics the brain






5. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.






6. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






7. Good for distance - longer than 100M






8. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






9. Jumping into dumpsters to retrieve information about someone/something/a company






10. The act of identifying yourself. Providing your identity to a system






11. The real cost of acquiring/maintaining/developing a system






12. In cryptography - it is a block cipher






13. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






14. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






15. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






16. A military standard defining controls for emanation protection






17. A sandbox. Emulates an operating environment.






18. When one key of a two-key pair has more encryption pattern than the other






19. Motivational tools for employee awareness to get them to report security flaws in an organization






20. A RFC standard. A mechanism for performing commands on a remote system






21. A site that has some equipment in place - and can be up within days






22. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






23. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






24. Closed Circuit Television






25. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






26. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






27. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






28. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






29. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






30. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






31. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






32. Using ICMP to diagram a network






33. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






34. The practice of obtaining confidential information by manipulation of legitimate users.






35. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






36. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






37. Continuation of Operations Plan






38. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






39. These viruses usually infect both boot records and files.






40. An instance of a scripting language






41. Animals with teeth. Not as discriminate as guards






42. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






43. Dialing fixed sets telephone numbers looking for open modem connections to machines






44. Someone whose hacking is primarily targeted at the phone systems






45. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






46. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






47. Making individuals accountable for their actions on a system typically through the use of auditing






48. Reasonable doubt






49. When two or more processes are linked and execute multiple programs simultaneously






50. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.