Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The output of a hash function is a digest.






2. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






3. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor






4. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






5. To not be legal (as far as law is concerned) or ethical






6. The person that controls access to the data






7. A card that holds information that must be authenticated to before it can reveal the information that it is holding






8. Something used to put out a fire. Can be in Classes A - B - C - D - or H






9. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec






10. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






11. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






12. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message






13. Ethernet - Cat5 - Twisted to allow for longer runs.






14. Relating to quality or kind. This assigns a level of importance to something.






15. Setting up the user to access the honeypot for reasons other than the intent to harm.






16. Enticing people to hit your honeypot to see how they try to access your system.






17. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






18. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.






19. Be at least 8 foot tall and have three strands of barbed wire.






20. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






21. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou






22. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.






23. Network devices that operate at layer 3. This device separates broadcast domains.






24. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






25. Chief Information Officer






26. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.






27. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c






28. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected






29. Involving the measurement of quantity or amount.






30. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






31. A network that uses proprietary protocols






32. The art of breaking code. Testing the strength of an algorithm.






33. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






34. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






35. A sandbox. Emulates an operating environment.






36. The practice of obtaining confidential information by manipulation of legitimate users.






37. Good for distance - longer than 100M






38. The user






39. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc






40. Network Address Translation






41. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






42. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.






43. Making individuals accountable for their actions on a system typically through the use of auditing






44. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






45. The practice of following someone with a security code or keycard through a security door - generally in workplaces.






46. Reasonable doubt






47. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






48. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.






49. In a separation of duties model - this is where code is checked in and out






50. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message