Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt






2. Once authenticated - the level of access you have to a system






3. Network device that operates at layer 1. Concentrator.






4. A gas used in fire suppression. Not human safe. Chemical reaction.






5. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.






6. The process of reducing your risks to an acceptable level based on your risk analysis






7. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






8. Using ICMP to diagram a network






9. The person that determines the permissions to files. The data owner.






10. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.






11. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






12. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp






13. The practice of following someone with a security code or keycard through a security door - generally in workplaces.






14. Software designed to infiltrate or damage a computer system - without the owner's consent.






15. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.






16. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.






17. Object Linking and Embedding. The ability of an object to be embedded into another object.






18. The ability to have more than one thread associated with a process






19. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






20. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






21. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards






22. Relating to quality or kind. This assigns a level of importance to something.






23. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.






24. Accepting all packets






25. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






26. Also civil law






27. Motive - Opportunity - and Means. These deal with crime.






28. Component Object Model.






29. When one key of a two-key pair has more encryption pattern than the other






30. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






31. Someone whose hacking is primarily targeted at the phone systems






32. The art of breaking code. Testing the strength of an algorithm.






33. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






34. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which






35. Computer Incident Response Team






36. Providing verification to a system






37. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.






38. A site that has some equipment in place - and can be up within days






39. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.






40. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.






41. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






42. Dialing fixed sets telephone numbers looking for open modem connections to machines






43. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.






44. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.






45. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






46. To not be legal (as far as law is concerned) or ethical






47. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.






48. Data storage formats and equipment that allow the stored data to be accessed in any order






49. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






50. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.