This practice exam tests knowledge on information security principles, including data protection, access control, and security protocols, aligning with CompTIA Security+ standards.
Confidentiality
Integrity
Signing
Hashing
Rate this question:
Symmetric
Blowfish
Skipjack
Asymmetric
Rate this question:
Access control
Data authentication
Data confidentiality
Data integrity
Rate this question:
Firewalls
Routers
Viruses
People
Rate this question:
ACL
BBC
CVS
DOS
Rate this question:
DoS (Denial of Service)
Spoofing
Brure force attack
Reverse DNS (Domain Name Service)
Rate this question:
Non-Negative
Non-Intrusion
False Positive
False Alarm
Rate this question:
Spread by way of e-mail
Self replicating
A form of malicious code
Self destructing
Rate this question:
War driving
Stake out
War dialing
Stake in
Rate this question:
CGI (Common Gateway Interface) script
Birthday
Buffer overflow
Dictionary
Rate this question:
Increased security staff
Paper and media distruction
Video surveillance equipment
Frequent trash removal
Rate this question:
S/MIME
HTTPS
SSH
SSL
Rate this question:
Viruses
Signatures
Hackers
Malware
Rate this question:
Secure Shell (SSH)
Password Authentication Protocol (PAP)
Authentication Header (AH)
Internet Protocol (IP)
Rate this question:
DDos
Back Door
Spoofing
Man in the Middle
Rate this question:
Evidence protection
Chain of custody
Chain of command
Incident response
Rate this question:
Authentication
Integrity
Confidentiality
Non-repudiation
Rate this question:
ACL
AES
SSH
SSL
Rate this question:
TCP (Transmission Control Protocol), 22
UDP (User Datagram Protocol), 69
TCP (Transmission Control Protocol), 179
UDP (User Datagram Protocol), 17
Rate this question:
AES (Advanced Encryption Standard)
3DES (Triple Data Encryption Standard)
DES (Data Encryption Standard)
Blowfish
Rate this question:
Penetration
Control
Audit planning
Discovery
Rate this question:
CAST (Carlisle Adams Stafford Tavares)
RC5 (Rivest Cipher 5)
RSA (Rivest Shamir Adelman)
SHA-1 (Secure Hashing Algorithm 1)
Rate this question:
Man in the Middle
Brute force
Reverse engineering
DoS (Denial of Service)
Rate this question:
Man in the Middle
Smurf
Teardrop
SYN (Synchronize)
Replicator
Virus
Trojan horse
Logic bomb
Rate this question:
Access control lists
Sensitivity labels
Tickets
Tokens
Rate this question:
21
161
53
49
Rate this question:
Speed
Key distribution
Weak algorithms
Memory management
Rate this question:
DoS (Denial of Service)
Exploits of system bugs
Spoofed e-mail
Port scan
Rate this question:
IPX
L2TP
PPTP
SSH
Rate this question:
Man in the Middle attack
Smurf attack
Ping of death attack
TCP SYN (Transmission Control Protocol / Synchronized) attack
Rate this question:
Authentication
Integrity
Confidentiality
Non-repudiation
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.