Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A gas used in fire suppression. Not human safe. Chemical reaction.






2. These viruses usually infect both boot records and files.






3. Chief Information Officer






4. Setting up the user to access the honeypot for reasons other than the intent to harm.






5. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






6. A network that mimics the brain






7. 'If you cant see it - its secure'. Bad policy to live by.






8. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time






9. A network that uses proprietary protocols






10. Closed Circuit Television






11. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications






12. White hat l0pht






13. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






14. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.






15. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe






16. Continuation of Operations Plan






17. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.






18. Occupant Emergency Plan - Employees are the most important!






19. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.






20. Computer Incident Response Team






21. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to






22. Once authenticated - the level of access you have to a system






23. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.






24. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.






25. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po






26. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th






27. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.






28. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters






29. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.






30. Threat to physical security.






31. Network Address Translation






32. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






33. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.






34. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.






35. Repeats the signal. It amplifies the signal before sending it on.






36. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi






37. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities






38. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.






39. Chief Executive Officer






40. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






41. When two or more processes are linked and execute multiple programs simultaneously






42. The ability to have more than one thread associated with a process






43. Personal - Network - and Application






44. Reasonable doubt






45. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






46. A technique to eliminate data redundancy.






47. The physical part of a computer - as distinguished from the computer software that executes within the hardware.






48. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute






49. A war dialing utility






50. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests