Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB






2. A mechanism by which connections to TCP services on a system are allowed or disallowed






3. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network






4. Motivational tools for employee awareness to get them to report security flaws in an organization






5. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.






6. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet






7. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans






8. These can be used to verify that public keys belong to certain individuals.






9. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac






10. Rolling command center with UPS - satellite - uplink - power - etc.






11. Closed Circuit Television






12. Computer Incident Response Team






13. Involving the measurement of quantity or amount.






14. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.






15. Jumping into dumpsters to retrieve information about someone/something/a company






16. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.






17. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single






18. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.






19. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t






20. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.






21. Dialing fixed sets telephone numbers looking for open modem connections to machines






22. Network devices that operate at layer 3. This device separates broadcast domains.






23. Access control method for database based on the content of the database to provide granular access






24. Emanations from one wire coupling with another wire






25. Internet Relay Chat.






26. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho






27. Continuation of Operations Plan






28. The user






29. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time






30. Scanning the airwaves for radio transmissions






31. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'






32. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






33. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.






34. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






35. Something used to put out a fire. Can be in Classes A - B - C - D - or H






36. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.






37. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






38. A network that uses standard protocols (TCP/IP)






39. Animals with teeth. Not as discriminate as guards






40. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational






41. Driving around enumerating wireless networks with the proper equipment (antennas and the like)






42. Assuming someone's session who is unaware of what you are doing






43. Also civil law






44. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






45. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)






46. Providing verification to a system






47. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.






48. CISSPs subscribe to a code of ethics for building up the security profession






49. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider






50. A network that uses proprietary protocols







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests