Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. HTTP port number






2. Checksums






3. Symmetric Key Ciphers






4. In Windows what is the path to the file that contains a list of well-known ports?






5. Types of L2TP Tunnels






6. Remote Desktop port number






7. Asymmetric Key Ciphers






8. TACACS port number






9. LDAP port number






10. L2TP port number






11. What is the SLE (Single Loss Expectancy)?






12. What formula is used to find the number of hosts?






13. Windows Password Authentication Protocols






14. In PKI what is the name of the file that tracks expired certificates?






15. IMAP port number






16. How can you identify a SQL Injection attack?






17. Do all hosts on a VLAN have to be connected to the same switch?






18. Can a VLAN be used to SEGREGATE access to a DHCP server?






19. Asymmetric Key Ciphers






20. What is a Rootkit?






21. Storage Types






22. POP3 port number






23. UPS Types






24. What is a Zombie?






25. Goals of Email Security






26. Does PGP rely on X.509 (Digital Certificates - PKI)?






27. DHCP port number






28. How does an offline UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. How does a differential backup work?






30. What is output validation?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


31. User Account Control (UAC) is an Example of






32. What is a hotfix?






33. Steps in the OVAL Assessment Process






34. What is the standard that covers PKI?






35. In a Windows Doamin - How is a GPO Applied?






36. When was NTLMv2 first introduced?






37. Examples of Social Engineering Attacks






38. What do digital signatures prove?






39. Can a VLAN provide scalability?






40. Weaknesses of Antivirus Software






41. What is a Trojan?






42. Secure Email Protocols






43. The Primary Causes of Compromised Security






44. NNTP port number






45. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






46. PPTP port number






47. How could a shared virtual machine reduce the workload for IT staff?






48. What is the standard that covers LDAP?






49. How do you ensure an email comes from the person it advertises as being the sender?






50. Password Crackers