What is a test result that indicates a threat exists when none exists?
What is a False Positive?
What protocol dynamically assigns IP address to hosts?
What is Dynamic Host Configuration Protocol? (DHCP)
What metric measures a system's reliability and estimates expected outages?
What is Mean Time Between Failures? (MTBF)
What is A string of code embedded in a program that executes in response to an action or event?
What is a Logic bomb? (Triggered Code)
What is the name of this command line tool that captures network packets for analysis?
What is TCPdump?
What type of attack tries every word in a list to guess passwords?
What is a Dictionary Attack?
What Protocol Delivers audio and video over IP networks?
What is Real-Time Transport Protocol? (RTP)
What refers to the time taken to restore a system after a failure?
What are five software Testing techniques?
What is Static Code analysis, Stress testing, Fuzzing, Sandboxing, or Verification?
Bonus Dynamic Code analysis
What protocol is currently used to secure HTTPS traffic?
What is TLS? (Transport Layer Security)
What type of attack allows you to access or steal information such as emails and contact list, calendars or text messages.
What is Bluesnarfing?
What protocol Securely transmits files in an encrypted format?
What is Secure File Transport Protocol?
What adds duplication to critical system components to provide fault tolerance?
What is Redundancy?
What term refers to a program that collects IP statistics without inspecting payloads or individual packet headers like wire shark?
What is NetFlow? (NetFlow is a traffic monitoring feature)
What command line protocol is used to remotely access devices securely? It is also used to for encrypted tunneling for other protocols such as SFTP and SCP.
What is Secure Shell? (SSH)
What type of attack allows attackers to send unsolicited messages to nearby Bluetooth devices?
What is Bluejacking?
What protocol runs inside of SECURE shell (SSH)?
><
ww
What is Secure File Transfer Protocol?
This edition of the CompTiA Security plus was written by Darril Gibson.
What subsystem provides fault tolerance for disks?
What is Redundant Array of Independent Disks? (RAID)
What is a feature found on routers and switches that captures network statistics for monitoring, allowing administrators to view network activity. (Data is stored and analyzed on the NetFlow collector.)
What is NetFlow?
What command-line tool is commonly used to scan networks and identify open ports and running services.
What is Nmap?
What time of attack provides information about databases, including reading and deleting data?
What is an SQL Injection Attack?
What protocol Securely copies files between systems over secure shell? (SSH)
What is Secure Copy Protocol? (SCP)
What metric represents the expected rate at which failures occur over a period of time?
What is an Annualized Rate of Occurrence? (ARO)
What is a Feature found on routers and switches that captures network statistics for monitoring?
What Linux command changes the permissions of a file, often used to secure scripts and executables?
What is Chmod? (Change Mode)?