Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. L2TP port number






2. UPS Types






3. What is a hotfix?






4. What do digital signatures prove?






5. Weaknesses of Antivirus Software






6. Examples of Social Engineering Attacks






7. Password Crackers






8. Human Behaviors that Social Engineering Will Exploit






9. Can a VLAN be used to SEGREGATE access to a DHCP server?






10. LDAP port number






11. DHCP port number






12. Symmetric Key Ciphers






13. Symmetric Key Ciphers






14. Protocols Used for VPN






15. Can PGP be used to provide nonrepudiation?






16. The 3 Ss






17. TACACS port number






18. What is THC Hydra?






19. How does a differential backup work?






20. POP3 port number






21. The 3 As






22. Do all hosts on a VLAN have to be connected to the same switch?






23. What formula is used to find the number of hosts?






24. Types of Firewalls






25. Remote Desktop port number






26. In a Windows Doamin - How is a GPO Applied?






27. Types of L2TP Tunnels






28. Access Control Models






29. Versions of NAT






30. How does the MAC model work?






31. Ways to Secure a WiFi Access Point






32. Steps in the OVAL Assessment Process






33. What is output validation?


34. What is UBE?






35. What is the name of Vista's hard drive encryption technology?






36. Checksums






37. The Goals of Security






38. What is PWDUMP?






39. SMTP port number






40. What is the standard that covers PKI?






41. How can you identify a SQL Injection attack?






42. What is the standard that covers LDAP?






43. What is a Zombie?






44. What is the difference between an online UPS and a double conversion UPS?






45. IPSEC Encryption Modes






46. What is the SLE (Single Loss Expectancy)?






47. What is a Trojan?






48. SSH port number






49. Telnet port number






50. Can a VLAN provide scalability?