Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocols Used for VPN






2. How does an offline UPS provide power?


3. Do all hosts on a VLAN have to be connected to the same switch?






4. PPTP port number






5. Versions of NAT






6. Can a VLAN be used to SEGREGATE access to a DHCP server?






7. TACACS port number






8. Types of Firewalls






9. HTTP port number






10. The Goals of Security






11. HTTPS port number






12. IMAP port number






13. How do you ensure an email comes from the person it advertises as being the sender?






14. DNS port number






15. Can PGP be used to provide nonrepudiation?






16. What is THC Hydra?






17. What is a Rootkit?






18. What is the name of Vista's hard drive encryption technology?






19. Asymmetric Key Ciphers






20. Types of L2TP Tunnels






21. Remote Desktop port number






22. POP3 port number






23. Can a VLAN provide scalability?






24. Asymmetric Key Ciphers






25. LDAP port number






26. How could a shared virtual machine reduce the workload for IT staff?






27. What is PWDUMP?






28. A web server that is located outside the DMZ is known as a...






29. Access Control Models






30. In a Windows Doamin - How is a GPO Applied?






31. What do digital signatures prove?






32. Examples of Social Engineering Attacks






33. UPS Types






34. Ways to Secure a WiFi Access Point






35. IDS/IPS Alerts






36. The Primary Causes of Compromised Security






37. L2TP port number






38. Symmetric Key Ciphers






39. When was NTLMv2 first introduced?






40. The 3 Ss






41. What formula is used to find the number of hosts?






42. Goals of Email Security






43. What is the standard that covers LDAP?






44. Does PGP rely on X.509 (Digital Certificates - PKI)?






45. In PKI what is the name of the file that tracks expired certificates?






46. Password Crackers






47. In Windows what is the path to the file that contains a list of well-known ports?






48. Password Attacks






49. What is a Trojan?






50. The 3 As