Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






2. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






3. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






4. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






5. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.






6. Dialing fixed sets telephone numbers looking for open modem connections to machines






7. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






8. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






9. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack






10. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






11. Internet Relay Chat.






12. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x






13. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






14. A site that has some equipment in place - and can be up within days






15. The frequency with which a threat is expected to occur.






16. Reasonable doubt






17. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






18. Disclosure - Alteration - Destruction. These things break the CIA triad






19. A system designed to stop piggybacking.






20. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






21. Also known as a tunnel)






22. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






23. Good for distance - longer than 100M






24. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






25. To not be legal (as far as law is concerned) or ethical






26. After implementing countermeasures - accepting risk for the amount of vulnerability left over






27. A war dialing utility






28. Jumping into dumpsters to retrieve information about someone/something/a company






29. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.






30. Continuation of Operations Plan






31. Rolling command center with UPS - satellite - uplink - power - etc.






32. Once authenticated - the level of access you have to a system






33. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






34. A network that uses standard protocols (TCP/IP)






35. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






36. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






37. The art of breaking code. Testing the strength of an algorithm.






38. When two or more processes are linked and execute multiple programs simultaneously






39. Also civil law






40. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






41. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






42. Component Object Model.






43. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






44. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






45. Setting up the user to access the honeypot for reasons other than the intent to harm.






46. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






47. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






48. The practice of following someone with a security code or keycard through a security door - generally in workplaces.






49. Making individuals accountable for their actions on a system typically through the use of auditing






50. Chief Executive Officer