Security+ Acronyms
Knowledge I
Bonus
Knowledge II
Security+ Logic
100
What does HTTPS stand for?
Hyper-Text Transfer Protocol Secure
100
Of the following questions, what can ensure the integrity of e-mail messages? a.) MD5 b.) AES c.) TwoFish d.) RSA
a.) MD5
100
Which of the following pieces of information makes it easiest for a subject to steal your identity? a.) Full Name b.) DOB c.) SSN d.) Current Address
c.) SSN
100
The administrator is updating firmware on routers throughout the company. Where should the administrator document this work? a.) Event Viewer b.) Router's System Log c.) Change Management System d.) Compliance Review System
c.) Change Management System
100
What type of encryption is best used for communication between a large group of people?
Asymmetric Ecryption
200
What does CHAP stand for?
Challenge Handshake Authentication Protocol
200
Used in conjuction, which of the following are PII? (Select TWO). a.) Marital status b.) Favorite movie c.) Pet's name d.) Birthday e.) Full name
d.) Birthday e.) Full name
200
Which of the following countries measure it's currency in pounds (£)?
United Kingdom
200
Sally is sending an e-mail, and she encrypted a portion of the e-mail with her private key. What can this provide? a.) Confidentiality b.) Validation of her certificate c.) Non-repudiation d.) One-time pad
c.) Non-repudiation
200
Kyle uses asymmetric encryption. He encrypted a message file with his private key and posted it in a forum. A user would like to reply to Kyle. What information is need for the user to reply through encryption while retaining confidentiality?
The user will need Kyle's Public Key
300
What does L2TP stand for?
Layer 2 Tunneling Protocol
300
A security firm has been engaged to assess a software application. A production-like test environment, login details, production documentation, and source code have been provided. Which of the following types of testing is being described? a.) White box b.) Gray box c.) Black box d.) Red teaming
a.) White box
300
Which of the following is the primary difference between a virus and a worm? a.) A worm is undetectable b.) A virus is typically larger c.) A virus is easily removed d.) A worm is self-replicating
d.) A worm is self-replicating
300
A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised? a.) Authenticity b.) Integrity c.) Availablility d.) Confidentiality
b.) Integrity
400
What does SNMP stand for?
Simple Network Management Protocol
400
A rogue access point with the same SSID as the production wireless network is found. Which of the following best describes this attack? a.) Evil twin b.) Vishing c.) War driving d.) Bluesnarfing
a.) Evil twin
400
How many miles is Atlanta, GA away from Montgomery. AL? a.) 220 b.) 160 c.) 210 d.) 190
b.) 160
400
On-going annual awareness security training should be coupled with: a.) succession planning b.) implementation of security controls c.) user rights and permissions review d.) signing of a user agreement
d.) signing of a user agreement
400
Which of the following is not a possible description of Type III authentication? a.) Smart cards b.) Fingerprints c.) Passwords d.) Retinal scans
c.) Passwords
500
What does WPA2-PSK stand for?
Wi-Fi Protected Access 2 Pre-Shared Key
500
The security administrator notices a number of TCP connections from the development department to the test network segregation. Large amounts of data are being transmitted between two networks only on port 22. Which of the following is MOST likely occurring? a.) The Development team is transferring data to test systems using FTP and TFTP. b.) The Development team is transferring data to test systems using SCP and TELNET. c.) The Development team is transferring data to test systems using SFTP and SCP . d.) The Development team is transferring data to test systems using SSL and SFTP.
c.) The Development team is transferring data to test systems using SFTP and SCP .
500
Of the year 2013, how much did Apple profit? How much did they revenue? a.) 500 million; 7 billion b.) 11 billion; 52 billion c.) 37 billion; 171 billion d.) 9 billion; 20 billion
c.) 37 billion; 171 billion
500
Due to sensitive data concerns, a security administrator has enacted a policy preventing the use of flash drives. Additionally, which of the following can the administrator implement to reduce the risk of data leakage? a.) Enact a policy that all work files are to be password protected. b.) Enact a policy banning users from bringing in personal music devices. c.) Provide users with encrypted storage devices that remain on-site. d.) Disallow users from saving data to any network share.
b.) Enact a policy banning users from bringing in personal music devices.
500
What is the most common type(s) of access control used for federal and government security systems? a.) Type I b.) Type II c.) Type III d.) Type II & Type III
d.) Type II & Type III
M
e
n
u