Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Accepting all packets






2. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






3. Ethernet - Cat5 - Twisted to allow for longer runs.






4. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc






5. In the broadest sense - a fraud is a deception made for personal gain






6. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






7. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






8. Chief Executive Officer






9. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.






10. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






11. When one key of a two-key pair has more encryption pattern than the other






12. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






13. Must be in place for you to use a biometric system






14. Dynamic Host Configuration Protocol.






15. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






16. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






17. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






18. Closed Circuit Television






19. A card that holds information that must be authenticated to before it can reveal the information that it is holding






20. The art of breaking code. Testing the strength of an algorithm.






21. After implementing countermeasures - accepting risk for the amount of vulnerability left over






22. Computer Incident Response Team






23. The practice of obtaining confidential information by manipulation of legitimate users.






24. Dialing fixed sets telephone numbers looking for open modem connections to machines






25. These viruses usually infect both boot records and files.






26. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






27. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






28. Assuming someone's session who is unaware of what you are doing






29. Also known as a tunnel)






30. Network Address Translation






31. Confidentiality - Integrity - and Availability






32. Also civil law






33. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






34. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






35. The act of identifying yourself. Providing your identity to a system






36. Someone whose hacking is primarily targeted at the phone systems






37. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.






38. A network that uses proprietary protocols






39. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






40. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






41. A network entity that provides a single entrance / exit point to the Internet.






42. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






43. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






44. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






45. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as






46. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






47. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it






48. Object Linking and Embedding. The ability of an object to be embedded into another object.






49. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






50. The real cost of acquiring/maintaining/developing a system