Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An instance of a scripting language






2. Someone whose hacking is primarily targeted at the phone systems






3. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






4. A system designed to stop piggybacking.






5. Common Object Request Broker Architecture.






6. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






7. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.






8. Must be in place for you to use a biometric system






9. Entails planning and system actions to ensure that a project is following good quality management practices






10. Making individuals accountable for their actions on a system typically through the use of auditing






11. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






12. The frequency with which a threat is expected to occur.






13. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






14. A gas used in fire suppression. Not human safe. Chemical reaction.






15. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.






16. An attempt to trick the system into believing that something false is real






17. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






18. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






19. These viruses usually infect both boot records and files.






20. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






21. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also






22. When two or more processes are linked and execute multiple programs simultaneously






23. Using ICMP to diagram a network






24. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






25. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






26. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






27. A military standard defining controls for emanation protection






28. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






29. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.






30. Network device that operates at layer 1. Concentrator.






31. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






32. A card that holds information that must be authenticated to before it can reveal the information that it is holding






33. Same as a block cipher except that it is applied to a data stream one bit at a time






34. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






35. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






36. Repeats the signal. It amplifies the signal before sending it on.






37. Someone who hacks






38. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






39. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






40. Dialing fixed sets telephone numbers looking for open modem connections to machines






41. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






42. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






43. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






44. White hat l0pht






45. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






46. A technique to eliminate data redundancy.






47. Transferring your risk to someone else - typically an insurance company






48. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.






49. A network that mimics the brain






50. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.