Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






2. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






3. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






4. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






5. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






6. Network device that operates at layer 1. Concentrator.






7. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






8. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.






9. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






10. To not be legal (as far as law is concerned) or ethical






11. The real cost of acquiring/maintaining/developing a system






12. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






13. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






14. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






15. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






16. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






17. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






18. Basic Input/Output System






19. More discriminate than dogs






20. The process of reducing your risks to an acceptable level based on your risk analysis






21. When security is managed at a central point in an organization






22. A network that uses standard protocols (TCP/IP)






23. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






24. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






25. Internet Architecture Board. This board is responsible for protecting the Internet.






26. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






27. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






28. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






29. Setting up the user to access the honeypot for reasons other than the intent to harm.






30. Good for distance - longer than 100M






31. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.






32. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).






33. Method of authenticating to a system. Something that you supply and something you know.






34. A military standard defining controls for emanation protection






35. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






36. Dynamic Host Configuration Protocol.






37. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






38. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.






39. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






40. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






41. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and






42. Someone whose hacking is primarily targeted at the phone systems






43. A RFC standard. A mechanism for performing commands on a remote system






44. A site that has some equipment in place - and can be up within days






45. Software designed to infiltrate or damage a computer system - without the owner's consent.






46. Chief Information Officer






47. Involving the measurement of quantity or amount.






48. The intercepting of conversations by unintended recipients






49. Rolling command center with UPS - satellite - uplink - power - etc.






50. A site that is ready physically but has no hardware in place - all it has is HVAC