Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






2. Be at least 8 foot tall and have three strands of barbed wire.






3. The person that determines the permissions to files. The data owner.






4. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






5. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






6. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






7. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






8. Rolling command center with UPS - satellite - uplink - power - etc.






9. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






10. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






11. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






12. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






13. A gas used in fire suppression. Not human safe. Chemical reaction.






14. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






15. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






16. When one key of a two-key pair has more encryption pattern than the other






17. Dynamic Host Configuration Protocol.






18. The practice of following someone with a security code or keycard through a security door - generally in workplaces.






19. Once authenticated - the level of access you have to a system






20. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






21. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






22. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






23. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






24. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






25. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






26. The real cost of acquiring/maintaining/developing a system






27. Distributed Component Object Model. Microsoft's implementation of CORBA.






28. A mechanism by which connections to TCP services on a system are allowed or disallowed






29. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






30. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






31. To not be legal (as far as law is concerned) or ethical






32. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.






33. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






34. Accepting all packets






35. Jumping into dumpsters to retrieve information about someone/something/a company






36. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






37. Animals with teeth. Not as discriminate as guards






38. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






39. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






40. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






41. Network devices that operate at layer 2. Every port on a switch is a separate collision domain






42. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






43. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t






44. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






45. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






46. Common Object Request Broker Architecture.






47. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






48. In a separation of duties model - this is where code is checked in and out






49. Chief Executive Officer






50. Entails planning and system actions to ensure that a project is following good quality management practices