Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






2. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






3. This is an open international standard for applications that use wireless communications.






4. An instance of a scripting language






5. A system designed to stop piggybacking.






6. When two or more processes are linked and execute multiple programs simultaneously






7. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






8. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






9. In a separation of duties model - this is where code is checked in and out






10. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






11. Once authenticated - the level of access you have to a system






12. Basic Input/Output System






13. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






14. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.






15. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






16. Relating to quality or kind. This assigns a level of importance to something.






17. CISSPs subscribe to a code of ethics for building up the security profession






18. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






19. Involving the measurement of quantity or amount.






20. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






21. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






22. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






23. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






24. A site that has some equipment in place - and can be up within days






25. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.






26. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.






27. The process of reducing your risks to an acceptable level based on your risk analysis






28. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






29. Network Address Translation






30. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






31. Internet Relay Chat.






32. The ability to have more than one thread associated with a process






33. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






34. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






35. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






36. After implementing countermeasures - accepting risk for the amount of vulnerability left over






37. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema






38. Someone who hacks






39. The person that controls access to the data






40. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)






41. Chief Information Officer






42. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s






43. A network that uses proprietary protocols






44. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






45. Continuation of Operations Plan






46. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






47. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






48. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.






49. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses






50. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal