Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. POP3 port number






2. Goals of Email Security






3. NNTP port number






4. Asymmetric Key Ciphers






5. Symmetric Key Ciphers






6. HTTPS port number






7. The Goals of Security






8. DHCP port number






9. How could a shared virtual machine reduce the workload for IT staff?






10. TACACS port number






11. Can a VLAN be used to SEGREGATE access to a DHCP server?






12. HTTP port number






13. Symmetric Key Ciphers






14. The 3 As






15. How does an incremental backup work?






16. In Windows what is the path to the file that contains a list of well-known ports?






17. What is UBE?






18. SSH port number






19. Steps in the OVAL Assessment Process






20. What is a Trojan?






21. IPSEC Encryption Modes






22. What is the standard that covers LDAP?






23. Storage Types






24. When was NTLMv2 first introduced?






25. What do digital signatures prove?






26. The Primary Causes of Compromised Security






27. Weaknesses of Antivirus Software






28. User Account Control (UAC) is an Example of






29. In a Windows Doamin - How is a GPO Applied?






30. The 3 Ss






31. Does PGP rely on X.509 (Digital Certificates - PKI)?






32. IDS/IPS Alerts






33. A web server that is located outside the DMZ is known as a...






34. Ways to Secure a WiFi Access Point






35. In PKI what is the name of the file that tracks expired certificates?






36. LDAP port number






37. Examples of Social Engineering Attacks






38. Remote Desktop port number






39. PPTP port number






40. UPS Types






41. L2TP port number






42. Versions of NAT






43. How does an online/double conversion UPS provide power?


44. What is THC Hydra?






45. What is PWDUMP?






46. How does an offline UPS provide power?


47. Types of Firewalls






48. Do all hosts on a VLAN have to be connected to the same switch?






49. What is a Rootkit?






50. What is the name of Vista's hard drive encryption technology?