Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A sandbox. Emulates an operating environment.






2. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






3. Common Object Request Broker Architecture.






4. Repeats the signal. It amplifies the signal before sending it on.






5. In a separation of duties model - this is where code is checked in and out






6. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






7. Dialing fixed sets telephone numbers looking for open modem connections to machines






8. A gas used in fire suppression. Not human safe. Chemical reaction.






9. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






10. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






11. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






12. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






13. Motive - Opportunity - and Means. These deal with crime.






14. A war dialing utility






15. Encompasses Risk Analysis and Risk Mitigation






16. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






17. Personal - Network - and Application






18. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






19. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






20. Reasonable doubt






21. Jumping into dumpsters to retrieve information about someone/something/a company






22. The output of a hash function is a digest.






23. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






24. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.






25. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






26. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






27. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






28. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






29. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






30. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






31. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.






32. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






33. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






34. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






35. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.






36. Animals with teeth. Not as discriminate as guards






37. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






38. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






39. Distributed Component Object Model. Microsoft's implementation of CORBA.






40. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






41. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






42. A network entity that provides a single entrance / exit point to the Internet.






43. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.






44. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






45. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






46. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






47. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






48. Emanations from one wire coupling with another wire






49. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






50. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access