Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Distributed Component Object Model. Microsoft's implementation of CORBA.






2. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






3. An instance of a scripting language






4. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






5. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






6. Once authenticated - the level of access you have to a system






7. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






8. Confidentiality - Integrity - and Availability






9. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






10. A card that holds information that must be authenticated to before it can reveal the information that it is holding






11. The act of identifying yourself. Providing your identity to a system






12. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






13. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






14. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r






15. Object Linking and Embedding. The ability of an object to be embedded into another object.






16. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






17. Relating to quality or kind. This assigns a level of importance to something.






18. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






19. Encompasses Risk Analysis and Risk Mitigation






20. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.






21. Dialing fixed sets telephone numbers looking for open modem connections to machines






22. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources






23. Continuation of Operations Plan






24. Same as a block cipher except that it is applied to a data stream one bit at a time






25. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses






26. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.






27. Network devices that operate at layer 3. This device separates broadcast domains.






28. Network devices that operate at layer 2. Every port on a switch is a separate collision domain






29. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.






30. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






31. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.






32. Chief Executive Officer






33. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






34. A network that mimics the brain






35. Assuming someone's session who is unaware of what you are doing






36. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.






37. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






38. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






39. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






40. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.






41. Using ICMP to diagram a network






42. Network device that operates at layer 1. Concentrator.






43. Motive - Opportunity - and Means. These deal with crime.






44. A hidden communications channel on a system that allows for the bypassing of the system security policy






45. Defines the objects and their attributes that exist in a database.






46. White hat l0pht






47. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message






48. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






49. Jumping into dumpsters to retrieve information about someone/something/a company






50. A mechanism by which connections to TCP services on a system are allowed or disallowed