Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Types of L2TP Tunnels






2. Asymmetric Key Ciphers






3. PPTP port number






4. What do digital signatures prove?






5. Access Control Models






6. What is a hotfix?






7. The 3 As






8. What is PWDUMP?






9. In a Windows Doamin - How is a GPO Applied?






10. Storage Types






11. Human Behaviors that Social Engineering Will Exploit






12. Can a VLAN provide scalability?






13. What formula is used to find the number of hosts?






14. What is a Rootkit?






15. What is output validation?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


16. The 3 Ss






17. A web server that is located outside the DMZ is known as a...






18. When was NTLMv2 first introduced?






19. How could a shared virtual machine reduce the workload for IT staff?






20. Asymmetric Key Ciphers






21. LDAP port number






22. Versions of NAT






23. DHCP port number






24. How does an online/double conversion UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


25. What is the standard that covers PKI?






26. Password Crackers






27. The Primary Causes of Compromised Security






28. UPS Types






29. TACACS port number






30. IDS/IPS Alerts






31. What is the SLE (Single Loss Expectancy)?






32. How does an incremental backup work?






33. HTTPS port number






34. What is UBE?






35. SMTP port number






36. How does a differential backup work?






37. What is a Zombie?






38. Examples of Social Engineering Attacks






39. Protocols Used for VPN






40. What is a Trojan?






41. IMAP port number






42. Does PGP rely on X.509 (Digital Certificates - PKI)?






43. How can you identify a SQL Injection attack?






44. HTTP port number






45. What is the name of Vista's hard drive encryption technology?






46. POP3 port number






47. What is the difference between an online UPS and a double conversion UPS?






48. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






49. In Windows what is the path to the file that contains a list of well-known ports?






50. Do all hosts on a VLAN have to be connected to the same switch?