Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SMTP port number






2. How do you ensure an email comes from the person it advertises as being the sender?






3. The Goals of Security






4. DNS port number






5. What is PWDUMP?






6. What is the standard that covers LDAP?






7. PPTP port number






8. Types of Firewalls






9. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






10. How does a differential backup work?






11. What is UBE?






12. What is the standard that covers PKI?






13. Human Behaviors that Social Engineering Will Exploit






14. What is a hotfix?






15. Steps in the OVAL Assessment Process






16. A web server that is located outside the DMZ is known as a...






17. Symmetric Key Ciphers






18. Asymmetric Key Ciphers






19. Can a VLAN provide scalability?






20. Symmetric Key Ciphers






21. How does an online/double conversion UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


22. IDS/IPS Alerts






23. User Account Control (UAC) is an Example of






24. Examples of Social Engineering Attacks






25. The 3 As






26. Remote Desktop port number






27. Secure Email Protocols






28. Versions of NAT






29. L2TP port number






30. Types of L2TP Tunnels






31. HTTPS port number






32. In Windows what is the path to the file that contains a list of well-known ports?






33. When was NTLMv2 first introduced?






34. Does PGP rely on X.509 (Digital Certificates - PKI)?






35. Protocols Used for VPN






36. What is a Rootkit?






37. How can you identify a SQL Injection attack?






38. How does an incremental backup work?






39. Weaknesses of Antivirus Software






40. IMAP port number






41. Do all hosts on a VLAN have to be connected to the same switch?






42. IPSEC Encryption Modes






43. How could a shared virtual machine reduce the workload for IT staff?






44. LDAP port number






45. Ways to Secure a WiFi Access Point






46. How does the MAC model work?






47. SSH port number






48. In PKI what is the name of the file that tracks expired certificates?






49. What is the difference between an online UPS and a double conversion UPS?






50. DHCP port number