Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Closed Circuit Television






2. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






3. Reasonable doubt






4. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






5. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






6. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






7. Chief Information Officer






8. A card that holds information that must be authenticated to before it can reveal the information that it is holding






9. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






10. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






11. Be at least 8 foot tall and have three strands of barbed wire.






12. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






13. The act of identifying yourself. Providing your identity to a system






14. A technique to eliminate data redundancy.






15. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






16. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






17. Random Number Base






18. A system designed to stop piggybacking.






19. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






20. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






21. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






22. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






23. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req






24. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






25. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






26. Access control method for database based on the content of the database to provide granular access






27. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






28. Network Address Translation






29. Software designed to infiltrate or damage a computer system - without the owner's consent.






30. Data storage formats and equipment that allow the stored data to be accessed in any order






31. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






32. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






33. The output of a hash function is a digest.






34. After implementing countermeasures - accepting risk for the amount of vulnerability left over






35. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






36. Distributed Component Object Model. Microsoft's implementation of CORBA.






37. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.






38. The real cost of acquiring/maintaining/developing a system






39. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






40. Relating to quality or kind. This assigns a level of importance to something.






41. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






42. Must be in place for you to use a biometric system






43. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






44. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






45. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






46. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.






47. Enticing people to hit your honeypot to see how they try to access your system.






48. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






49. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






50. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.