Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does the MAC model work?






2. Ways to Secure a WiFi Access Point






3. IPSEC Encryption Modes






4. Telnet port number






5. What is a Rootkit?






6. PPTP port number






7. Steps in the OVAL Assessment Process






8. How does an incremental backup work?






9. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






10. UPS Types






11. The 3 Ss






12. The Goals of Security






13. Access Control Models






14. Remote Desktop port number






15. What is a Trojan?






16. How do you ensure an email comes from the person it advertises as being the sender?






17. In PKI what is the name of the file that tracks expired certificates?






18. POP3 port number






19. What is UBE?






20. SMTP port number






21. A web server that is located outside the DMZ is known as a...






22. Asymmetric Key Ciphers






23. What is the difference between an online UPS and a double conversion UPS?






24. User Account Control (UAC) is an Example of






25. What formula is used to find the number of hosts?






26. What do digital signatures prove?






27. Symmetric Key Ciphers






28. What is PWDUMP?






29. How can you identify a SQL Injection attack?






30. Symmetric Key Ciphers






31. Do all hosts on a VLAN have to be connected to the same switch?






32. The Primary Causes of Compromised Security






33. What is a Zombie?






34. IDS/IPS Alerts






35. Versions of NAT






36. In Windows what is the path to the file that contains a list of well-known ports?






37. Protocols Used for VPN






38. Human Behaviors that Social Engineering Will Exploit






39. How does an online/double conversion UPS provide power?


40. When was NTLMv2 first introduced?






41. What is output validation?


42. Can PGP be used to provide nonrepudiation?






43. In a Windows Doamin - How is a GPO Applied?






44. How does an offline UPS provide power?


45. Examples of Social Engineering Attacks






46. What is the name of Vista's hard drive encryption technology?






47. IMAP port number






48. Weaknesses of Antivirus Software






49. What is a hotfix?






50. DNS port number