Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The person that determines the permissions to files. The data owner.






2. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






3. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






4. Someone who hacks






5. Animals with teeth. Not as discriminate as guards






6. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -






7. Rolling command center with UPS - satellite - uplink - power - etc.






8. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






9. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.






10. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






11. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






12. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....






13. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






14. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.






15. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






16. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






17. A site that is ready physically but has no hardware in place - all it has is HVAC






18. Basic Input/Output System






19. A network that mimics the brain






20. Dialing fixed sets telephone numbers looking for open modem connections to machines






21. Internet Relay Chat.






22. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






23. Same as a block cipher except that it is applied to a data stream one bit at a time






24. Also civil law






25. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






26. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work






27. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






28. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






29. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user






30. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






31. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






32. Software designed to infiltrate or damage a computer system - without the owner's consent.






33. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






34. A set of rules applied by many transit networks which restrict the ways in which the network may be used.






35. Threat to physical security.






36. A mechanism by which connections to TCP services on a system are allowed or disallowed






37. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






38. To not be legal (as far as law is concerned) or ethical






39. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






40. Good for distance - longer than 100M






41. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE






42. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






43. Network devices that operate at layer 3. This device separates broadcast domains.






44. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






45. The process of reducing your risks to an acceptable level based on your risk analysis






46. Repeats the signal. It amplifies the signal before sending it on.






47. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.






48. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






49. Be at least 8 foot tall and have three strands of barbed wire.






50. A system designed to stop piggybacking.