Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth






2. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






3. A sandbox. Emulates an operating environment.






4. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






5. Repeats the signal. It amplifies the signal before sending it on.






6. Motive - Opportunity - and Means. These deal with crime.






7. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access






8. Dialing fixed sets telephone numbers looking for open modem connections to machines






9. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.






10. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






11. Network devices that operate at layer 2. Every port on a switch is a separate collision domain






12. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






13. The practice of following someone with a security code or keycard through a security door - generally in workplaces.






14. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






15. The process of reducing your risks to an acceptable level based on your risk analysis






16. In cryptography - it is a block cipher






17. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






18. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.






19. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






20. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.






21. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






22. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






23. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






24. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list






25. Using ICMP to diagram a network






26. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






27. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst






28. These viruses usually infect both boot records and files.






29. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t






30. Common Object Request Broker Architecture.






31. A war dialing utility






32. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






33. CISSPs subscribe to a code of ethics for building up the security profession






34. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






35. Closed Circuit Television






36. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






37. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






38. Scanning the airwaves for radio transmissions






39. When security is managed at many different points in an organization






40. An instance of a scripting language






41. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






42. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.






43. A network entity that provides a single entrance / exit point to the Internet.






44. This factor represents a measure of the magnitude of loss or impact on the value of an asset.






45. Distributed Component Object Model. Microsoft's implementation of CORBA.






46. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






47. The person that controls access to the data






48. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra






49. Ethernet - Cat5 - Twisted to allow for longer runs.






50. Animals with teeth. Not as discriminate as guards