Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. PPTP port number






2. SSH port number






3. Can PGP be used to provide nonrepudiation?






4. What is THC Hydra?






5. HTTPS port number






6. Human Behaviors that Social Engineering Will Exploit






7. Asymmetric Key Ciphers






8. Do all hosts on a VLAN have to be connected to the same switch?






9. What is a Zombie?






10. L2TP port number






11. Goals of Email Security






12. A web server that is located outside the DMZ is known as a...






13. Types of L2TP Tunnels






14. Windows Password Authentication Protocols






15. Can a VLAN provide scalability?






16. TACACS port number






17. DNS port number






18. DHCP port number






19. IDS/IPS Alerts






20. Asymmetric Key Ciphers






21. UPS Types






22. What is a Trojan?






23. How could a shared virtual machine reduce the workload for IT staff?






24. The 3 Ss






25. What is the standard that covers PKI?






26. What is PWDUMP?






27. Checksums






28. In a Windows Doamin - How is a GPO Applied?






29. SMTP port number






30. Can a VLAN be used to SEGREGATE access to a DHCP server?






31. POP3 port number






32. How does the MAC model work?






33. Symmetric Key Ciphers






34. The 3 As






35. Ways to Secure a WiFi Access Point






36. What is output validation?


37. Password Crackers






38. Protocols Used for VPN






39. In Windows what is the path to the file that contains a list of well-known ports?






40. IMAP port number






41. LDAP port number






42. Types of Firewalls






43. Symmetric Key Ciphers






44. What do digital signatures prove?






45. What formula is used to find the number of hosts?






46. Examples of Social Engineering Attacks






47. How does an offline UPS provide power?


48. Secure Email Protocols






49. When was NTLMv2 first introduced?






50. What is the standard that covers LDAP?