IT CertificationsComprehensive Study Set

Comptia Security+ Sy0 601 Cheat Sheet Pdf

82 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

21

ANSWER

FTP , DMZ

QUESTION 2

22

ANSWER

SSH

QUESTION 3

25

ANSWER

SMTP

QUESTION 4

49

ANSWER

TACACS

QUESTION 5

53

ANSWER

DNS

QUESTION 6

67&68

ANSWER

HTTP

QUESTION 7

110

ANSWER

POP3

QUESTION 8

143

ANSWER

IMAP4

QUESTION 9

161

ANSWER

SNMP

QUESTION 10

389&636

ANSWER

LDAP

QUESTION 11

443

ANSWER

HTTPS/SSL

QUESTION 12

UDP 1701

ANSWER

L2TP

QUESTION 13

TCP 1723

ANSWER

PPTP

QUESTION 14

CLASS A

ANSWER

1-27, 10.0.0.0 255.0.0.0

QUESTION 15

CLASS B

ANSWER

128-191, 172.16.0.0-172.31.0.0, 255.255.0.0, 65,00

QUESTION 16

CLASS C

ANSWER

192-223, 192.168.0.0, 255.255.255.0

QUESTION 17

SQL

ANSWER

actions, objects, users

QUESTION 18

ISAKMP

ANSWER

(internet security association and key management protocol)used to negotiate and provide authenticated keying material for security associations in a protected manner

QUESTION 19

SSL

ANSWER

the secure sockets layer protocol has two parts. First, the SSL Handshake protocol establishes the secure channel. Next, the SSL Application data protocol is used to exchange data over the channel. 6 steps in the handshaking process

QUESTION 20

X5.09

ANSWER

users public key, the CA distinguished name and the type of symmetric algorithm used for encryption

QUESTION 21

CHAP

ANSWER

exchange of hashed values

QUESTION 22

Certificates

ANSWER

used w/i a PKI for asymmetric key

QUESTION 23

token based

ANSWER

requires possession of token

QUESTION 24

Biometric

ANSWER

authentication

QUESTION 25

Key generation

ANSWER

a public key pair is created and held by the CA

QUESTION 26

Identity submission

ANSWER

the CA creates a certificate signed by its own digital certificate

QUESTION 27

Distribution

ANSWER

the CA publishes the generated certificate

QUESTION 28

Usage

ANSWER

the receiving entity is authorized to use the certificate only for its intended use

QUESTION 29

Renewal

ANSWER

If needed a new key pair can be generated and the cert renewed

QUESTION 30

Recovery

ANSWER

possible if a verifying key is compromised but the holder is still valid and trusted

QUESTION 31

smurf

ANSWER

Based on the icmp echo reply

QUESTION 32

Fraggle

ANSWER

smurf like attack based on UDP packets

QUESTION 33

Ping flood

ANSWER

repeated SYN requests w/o ack

QUESTION 34

Land

ANSWER

exploits TCP/IP stacks using spoofed SYNS

QUESTION 35

Teardrop

ANSWER

an attack using overlapping, fragmented UDP packets that cant be reassembled correctly

QUESTION 36

Bonk

ANSWER

an attack of port 53 using fragmented UDP packets w/ bogus reassembly information

QUESTION 37

Boink

ANSWER

bonk like attack but on multiple ports

QUESTION 38

Spoofing

ANSWER

process of making data look like it was from someone else

QUESTION 39

Man in the Middle

ANSWER

intercepting traffic between 2 systems and using a third system pretending to be one of the others

QUESTION 40

Mathematical attacks

ANSWER

key guessing, password guessing, brute force, dictionary attacks

QUESTION 41

Viruses

ANSWER

infect systems and spread copies of themselves

QUESTION 42

Trojan horse

ANSWER

disguise malicious code within apparently useful applications

QUESTION 43

Logic Bombs

ANSWER

trigger on a particular condition

QUESTION 44

worm

ANSWER

self replicating forms of other types of malicious code

QUESTION 45

java and active x control

ANSWER

automatically executes when sent via e-mail

QUESTION 46

Cryptography

ANSWER

scrambling information so it appears unreadable to the attackers

QUESTION 47

stenography

ANSWER

Hides the existence of data

QUESTION 48

encryption

ANSWER

changing original text into a secret message

QUESTION 49

Decryption

ANSWER

changing secret message back to original form

QUESTION 50

cleartext data

ANSWER

data stored or transmitted without encryption

QUESTION 51

Plaintext

ANSWER

data to be encrypted

QUESTION 52

ciphertext

ANSWER

data that has been encrypted

QUESTION 53

key

ANSWER

mathematical value entered into the algorithim to produce ciphertext

QUESTION 54

Hash Algorithims

ANSWER

process for creating a unique digital fingerprint for a set of data

QUESTION 55

HMAC (hashed messafe authentication code

ANSWER

uses secret key possessed by sender and receiver. receiver uses key to decrpy the hash

QUESTION 56

Common hash algorithims

ANSWER

MD, SHA, Whirlpool, RIPEMD, Password hashes

QUESTION 57

MD2

ANSWER

creates 128 bit hash

QUESTION 58

MD4

ANSWER

has flaws not widely accepted

QUESTION 59

MD5

ANSWER

creates 512 bits

QUESTION 60

SHA

ANSWER

more secure than MD

QUESTION 61

whirlpool

ANSWER

512 bit hash

QUESTION 62

RIPEMD

ANSWER

two different and parallel chains of computation

QUESTION 63

Password hashes

ANSWER

used by Microsoft Windows operating systems

QUESTION 64

Stream Cipher

ANSWER

takes a character and replaces it with a character. Substitution cipher

QUESTION 65

Homoalphabetic Substitution Cipher

ANSWER

Single plaintext character mapped to multiple cipher text character

QUESTION 66

Transposition cipher

ANSWER

rearranges letters without changing them

QUESTION 67

One-time pad

ANSWER

creates a truly random key to combine with the plaintext

QUESTION 68

Block cipher

ANSWER

works on entire block of plaintext at a time

QUESTION 69

Data Encryption standard (DES)

ANSWER

based on product originally designed in early 1970's. Adopted as a standard by U.S government

QUESTION 70

Triple Data Encryption Standard 3DES

ANSWER

Uses three rounds of encryption

QUESTION 71

AES (Advanced encryption standard)

ANSWER

symmetric cipher approved by NIST 2000 as replacement for DES

QUESTION 72

Rivest Cipher (RC)

ANSWER

Block cipher operating on 64-bit blocks with key lengths from 32-448 bits

QUESTION 73

Blowfish

ANSWER

available to everyone and freely distributed

QUESTION 74

Public key

ANSWER

known only to individual to whom it belongs

QUESTION 75

Private key

ANSWER

verifies the sender, prevents sender from disowning the message, Proves message integrity

QUESTION 76

Digital signature

ANSWER

MIT

QUESTION 77

RSA

ANSWER

users share one elliptic curve and one point on the curve. Uses less computing power, used for mobile and wireless devices

QUESTION 78

ECC (Elliptic curve cryptography)

ANSWER

exploits the properties of microscopic objects such as photons.

QUESTION 79

Quantam cryptography

ANSWER

uses lattice based cyptography

QUESTION 80

NTRUEncypt

ANSWER

used for files and e-mails on windows systems

QUESTION 81

PGP (pretty good privacy)

ANSWER

runs on windows, unix and linux

QUESTION 82

GNU privacy guard (gpg

ANSWER

cryptography scrambles a message so that it cannot be viewed

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials