Test your basic knowledge |

Comptia Security +: Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When two or more processes are linked and execute multiple programs simultaneously






2. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access






3. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)






4. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i






5. Setting up the user to access the honeypot for reasons other than the intent to harm.






6. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.






7. More discriminate than dogs






8. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti






9. The real cost of acquiring/maintaining/developing a system






10. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet






11. Scanning the airwaves for radio transmissions






12. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal






13. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl






14. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.






15. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t






16. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.






17. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically






18. Internet Relay Chat.






19. A gas used in fire suppression. Not human safe. Chemical reaction.






20. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database






21. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the






22. The intercepting of conversations by unintended recipients






23. The output of a hash function is a digest.






24. Entails planning and system actions to ensure that a project is following good quality management practices






25. Using ICMP to diagram a network






26. A site that is ready physically but has no hardware in place - all it has is HVAC






27. Signal degradation as it moves farther from its source






28. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.






29. Occupant Emergency Plan - Employees are the most important!






30. Separation of duties (SoD) is the concept of having more than one person required to complete a task.






31. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of






32. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.






33. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste






34. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.






35. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh






36. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.






37. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.






38. Making individuals accountable for their actions on a system typically through the use of auditing






39. Distributed Component Object Model. Microsoft's implementation of CORBA.






40. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable






41. A network entity that provides a single entrance / exit point to the Internet.






42. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.






43. False Acceptance Rate - False Rejection Rate - Crossover Error Rate






44. Repeats the signal. It amplifies the signal before sending it on.






45. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.






46. Network devices that operate at layer 2. Every port on a switch is a separate collision domain






47. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.






48. Disclosure - Alteration - Destruction. These things break the CIA triad






49. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.






50. Accepting all packets