Security+ Acronym Test

14 Questions | Attempts: 262
Share

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Security is most important to everyone to ensure that peace and tranquility is achieved. Do you work in the security sector? If you are prepared to test your knowledge on the subject this quiz out.


Questions and Answers
  • 1. 

    A calculation that is used to identify risks and calculate the expected loss each year is _______ Loss Expectancy (ALE)?

    • A.

      All

    • B.

      Annual

    • C.

      Authenticated

    • D.

      Accepted

    Correct Answer
    B. Annual
  • 2. 

    Protocol used to map known IP addresses to unknown physical addresses is Address __________  Protocol (ARP) Stands for?

    • A.

      Resolution

    • B.

      Repair

    • C.

      Recovery

    • D.

      Rescission

    Correct Answer
    A. Resolution
  • 3. 

    A protocol that challenges a system to verify identity which is an improvement over Password Authentication Protocol is Challenge _________ Authentication Protocal (CHAP)?

    • A.

      Host

    • B.

      Hopping

    • C.

      Hyper

    • D.

      Handshake

    Correct Answer
    D. Handshake
  • 4. 

    A method of restricting access to objects based on the identity of the subjects or the groups to which they belong is _________ Access Control (DAC)?

    • A.

      Discredited

    • B.

      Discretionary

    • C.

      Denial

    • D.

      Dynamic

    Correct Answer
    B. Discretionary
  • 5. 

    A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public. ___________ Denial of Service (DDOS) Stands for: 

    • A.

      Distributed

    • B.

      Discretionary

    • C.

      Demilitarized

    • D.

      Derivative

    Correct Answer
    A. Distributed
  • 6. 

    A security policy wherein labels are used to identify the sensitivity of objects is ________ Access Control (MAC)?

    • A.

      Managed

    • B.

      Multipurpose

    • C.

      Mandatory

    • D.

      Microsoft

    Correct Answer
    C. Mandatory
  • 7. 

    All communications look as if they originated from a proxy server because the IP address of the user making a request is hidden is also known as Network _________ Translation (NAT)?

    • A.

      Authentication

    • B.

      Address

    • C.

      Access

    • D.

      Algorithm

    Correct Answer
    B. Address
  • 8. 

    Between 1901 and 1988 as the National Bureau of Standards (NBS), which is a measurement standards labratory which is a non-regulatory agency of the United States Department of Commerce  is now called the National  _______ of Standards and Technology (NIST)?

    • A.

      Internet

    • B.

      Intrustion

    • C.

      Institute

    • D.

      Infrastructure

    Correct Answer
    C. Institute
  • 9. 

     Network- __________ Detection System (N-IDS) attaches the system to a point in the network where it can monitor and report on all network traffic.

    • A.

      Internet

    • B.

      Intrusion

    • C.

      Institute

    • D.

      Infrastructure

    Correct Answer
    B. Intrusion
  • 10. 

    While Plain Old _________ Service (POTS )provides limited features, low bandwith and no mobile capabilities, it provides greater reliability than other telephony systems mobile phone, VOIP, etc.  

    • A.

      Transport

    • B.

      Text

    • C.

      Transfer

    • D.

      Telephone

    Correct Answer
    D. Telephone
  • 11. 

    Pretty _______ Privacy (PGP) is an implementation of RSA encryption. 

    • A.

      Great

    • B.

      Good

    • C.

      Group

    • D.

      Golden

    Correct Answer
    B. Good
  • 12. 

    Password __________ Protocol (PAP) is accomplished by sending the username and password to the server and having them verified. 

    • A.

      Accessing

    • B.

      Access

    • C.

      Activity

    • D.

      Authentication

    Correct Answer
    D. Authentication
  • 13. 

    Access _______ List (ACL) is a table or data file that specifies whether a user or group has access to a specific resource on a computer or network. 

    • A.

      Center

    • B.

      Checkpoint

    • C.

      Control

    • D.

      Confidentiality

    Correct Answer
    C. Control
  • 14. 

    ___________ Zone (DMZ) is an area for placing web and other servers outside the firewall, therefore, isolation them from internal network access. 

    • A.

      Demilitarized

    • B.

      Data Messaging

    • C.

      Mantrap

    • D.

      DeArmored

    Correct Answer
    A. Demilitarized

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 16, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 08, 2011
    Quiz Created by
    Lmjr88
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.