Security+ Acronym Test

14 Questions | Attempts: 262
Please wait...
Question 1 / 15
🏆 Rank #--
Score 0/100

1. Access _______ List (ACL) is a table or data file that specifies whether a user or group has access to a specific resource on a computer or network. 

Submit
Please wait...
About This Quiz
Security Plus Quizzes & Trivia

Security is most important to everyone to ensure that peace and tranquility is achieved. Do you work in the security sector? If you are prepared to test your knowledge on the subject this quiz out.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2.  Network- __________ Detection System (N-IDS) attaches the system to a point in the network where it can monitor and report on all network traffic.

Submit

3. ___________ Zone (DMZ) is an area for placing web and other servers outside the firewall, therefore, isolation them from internal network access. 

Submit

4. A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public. ___________ Denial of Service (DDOS) Stands for: 

Submit

5. A calculation that is used to identify risks and calculate the expected loss each year is _______ Loss Expectancy (ALE)?

Submit

6. Protocol used to map known IP addresses to unknown physical addresses is Address __________  Protocol (ARP) Stands for?

Submit

7. Between 1901 and 1988 as the National Bureau of Standards (NBS), which is a measurement standards labratory which is a non-regulatory agency of the United States Department of Commerce  is now called the National  _______ of Standards and Technology (NIST)?

Submit

8. Pretty _______ Privacy (PGP) is an implementation of RSA encryption. 

Submit

9. Password __________ Protocol (PAP) is accomplished by sending the username and password to the server and having them verified. 

Submit

10. All communications look as if they originated from a proxy server because the IP address of the user making a request is hidden is also known as Network _________ Translation (NAT)?

Submit

11. A protocol that challenges a system to verify identity which is an improvement over Password Authentication Protocol is Challenge _________ Authentication Protocal (CHAP)?

Submit

12. While Plain Old _________ Service (POTS )provides limited features, low bandwith and no mobile capabilities, it provides greater reliability than other telephony systems mobile phone, VOIP, etc.  

Submit

13. A method of restricting access to objects based on the identity of the subjects or the groups to which they belong is _________ Access Control (DAC)?

Submit

14. A security policy wherein labels are used to identify the sensitivity of objects is ________ Access Control (MAC)?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (14)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Access _______ List (ACL) is a table or data file that specifies...
 Network- __________ Detection System (N-IDS) attaches the system...
___________ Zone (DMZ) is an area for placing web and other...
A derivative of a DoS attack in which multiple hosts in multiple...
A calculation that is used to identify risks and calculate the...
Protocol used to map known IP addresses to unknown physical addresses...
Between 1901 and 1988 as the National Bureau of Standards (NBS), which...
Pretty _______ Privacy (PGP) is an implementation of RSA...
Password __________ Protocol (PAP) is accomplished by sending the...
All communications look as if they originated from a proxy server...
A protocol that challenges a system to verify identity which is an...
While Plain Old _________ Service (POTS )provides limited features,...
A method of restricting access to objects based on the identity of the...
A security policy wherein labels are used to identify the sensitivity...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!