Network Attacks & Threats
Protocol & File Transfer
Reliability & Fault Tolerance
Programming & Exploits
Security Tools & Commands
100

What is a test result that indicates a threat exists when none exists?

What is a False Positive?

100

What protocol dynamically assigns IP address to hosts?

What is Dynamic Host Configuration Protocol? (DHCP)

100

What metric measures a system's reliability and estimates expected outages?

What is Mean Time Between Failures? (MTBF)

100

What is A string of code embedded in a program that executes in response to an action or event?

What is a Logic bomb?  (Triggered Code)

100

What is the name of this command line tool that captures network packets for analysis?

What is TCPdump?

200

What type of attack tries every word in a list to guess passwords?

What is a Dictionary Attack?

200

What Protocol Delivers audio and video over IP networks?

 What is Real-Time Transport Protocol? (RTP)

200

What refers to the time taken to restore a system after a failure?

What is Mean Time To Repair? (MTTR)
200

What are five software Testing techniques?

What is Static Code analysis, Stress testing, Fuzzing, Sandboxing, or Verification? 

Bonus Dynamic Code analysis

200

What protocol is currently used to secure HTTPS traffic?

What is TLS? (Transport Layer Security) 

300

What type of attack allows you to access or steal  information such as emails and contact list, calendars or text messages.

What is Bluesnarfing?

300

What protocol Securely transmits files in an encrypted format?

What is Secure File Transport Protocol?

300

What adds duplication to critical system components to provide fault tolerance?

What is Redundancy?

300

What term refers to a program that collects IP statistics without inspecting payloads or individual packet headers like wire shark?

What is NetFlow? (NetFlow is a traffic monitoring feature)

300

What command line protocol is used to remotely access devices securely? It is also used to for encrypted tunneling for other protocols such as SFTP and SCP.

What is Secure Shell? (SSH)

400

What type of attack allows attackers to send unsolicited messages to nearby Bluetooth devices?

What is Bluejacking?

400

What protocol runs inside of SECURE shell (SSH)?  

><

ww

What is Secure File Transfer Protocol?

This edition of the CompTiA Security plus was written by Darril Gibson.

400

What subsystem provides fault tolerance for disks?

What is Redundant Array of Independent Disks? (RAID)

400

What is a feature found on routers and switches that captures network statistics for monitoring, allowing administrators to view network activity. (Data is stored and analyzed on the NetFlow collector.) 

What is NetFlow?

400

What command-line tool is commonly used to scan networks and identify open ports and running services. 

What is Nmap?

500

What time of attack provides information about databases, including reading and deleting data?

What is an SQL Injection Attack?

500

What protocol Securely copies files between systems over secure shell? (SSH)

What is Secure Copy Protocol? (SCP)

500

What metric represents the expected rate at which failures occur over a period of time?

What is an Annualized Rate of Occurrence? (ARO)

500

What is a Feature found on routers and switches that captures network statistics for monitoring?

What is Simple Network Management Protocol? (SNMP)
500

What Linux command changes the permissions of a file, often used to secure scripts and executables?

What is Chmod? (Change Mode)?

M
e
n
u