Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a Rootkit?






2. IPSEC Encryption Modes






3. What is the standard that covers LDAP?






4. Can a VLAN provide scalability?






5. UPS Types






6. What is output validation?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


7. Telnet port number






8. POP3 port number






9. Can a VLAN be used to SEGREGATE access to a DHCP server?






10. PPTP port number






11. IDS/IPS Alerts






12. Symmetric Key Ciphers






13. Secure Email Protocols






14. Windows Password Authentication Protocols






15. A web server that is located outside the DMZ is known as a...






16. Protocols Used for VPN






17. Do all hosts on a VLAN have to be connected to the same switch?






18. What do digital signatures prove?






19. Versions of NAT






20. Asymmetric Key Ciphers






21. How do you ensure an email comes from the person it advertises as being the sender?






22. What is the name of Vista's hard drive encryption technology?






23. The Goals of Security






24. User Account Control (UAC) is an Example of






25. SMTP port number






26. IMAP port number






27. What is a Trojan?






28. What is UBE?






29. What formula is used to find the number of hosts?






30. How could a shared virtual machine reduce the workload for IT staff?






31. In PKI what is the name of the file that tracks expired certificates?






32. Password Attacks






33. How does an incremental backup work?






34. What is PWDUMP?






35. How does an online/double conversion UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


36. NNTP port number






37. The 3 Ss






38. Password Crackers






39. Remote Desktop port number






40. SSH port number






41. What is a Zombie?






42. Can PGP be used to provide nonrepudiation?






43. Checksums






44. The Primary Causes of Compromised Security






45. Types of L2TP Tunnels






46. In a Windows Doamin - How is a GPO Applied?






47. What is THC Hydra?






48. How does the MAC model work?






49. Examples of Social Engineering Attacks






50. Weaknesses of Antivirus Software