Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Network Address Translation






2. Someone whose hacking is primarily targeted at the phone systems






3. Be at least 8 foot tall and have three strands of barbed wire.






4. Access control method for database based on the content of the database to provide granular access






5. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






6. A mechanism by which connections to TCP services on a system are allowed or disallowed






7. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






8. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec






9. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






10. In a separation of duties model - this is where code is checked in and out






11. The person that determines the permissions to files. The data owner.






12. A RFC standard. A mechanism for performing commands on a remote system






13. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






14. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






15. The act of identifying yourself. Providing your identity to a system






16. The user






17. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.






18. A hidden communications channel on a system that allows for the bypassing of the system security policy






19. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






20. Animals with teeth. Not as discriminate as guards






21. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






22. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






23. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






24. Entails planning and system actions to ensure that a project is following good quality management practices






25. To not be legal (as far as law is concerned) or ethical






26. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






27. A technique to eliminate data redundancy.






28. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






29. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






30. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






31. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






32. Occupant Emergency Plan - Employees are the most important!






33. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






34. Network devices that operate at layer 2. Every port on a switch is a separate collision domain






35. White hat l0pht






36. A system designed to stop piggybacking.






37. The ability to have more than one thread associated with a process






38. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






39. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






40. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






41. Confidentiality - Integrity - and Availability






42. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






43. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






44. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






45. Chief Information Officer






46. The practice of obtaining confidential information by manipulation of legitimate users.






47. A sandbox. Emulates an operating environment.






48. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






49. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer






50. Defines the objects and their attributes that exist in a database.