Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the standard that covers LDAP?






2. HTTPS port number






3. What formula is used to find the number of hosts?






4. In Windows what is the path to the file that contains a list of well-known ports?






5. Steps in the OVAL Assessment Process






6. L2TP port number






7. In a Windows Doamin - How is a GPO Applied?






8. Types of L2TP Tunnels






9. What is a Zombie?






10. Symmetric Key Ciphers






11. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






12. LDAP port number






13. What is THC Hydra?






14. What is PWDUMP?






15. Storage Types






16. Access Control Models






17. Can a VLAN be used to SEGREGATE access to a DHCP server?






18. Protocols Used for VPN






19. What is a hotfix?






20. How does an offline UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


21. Do all hosts on a VLAN have to be connected to the same switch?






22. PPTP port number






23. Asymmetric Key Ciphers






24. IDS/IPS Alerts






25. TACACS port number






26. DNS port number






27. Telnet port number






28. Symmetric Key Ciphers






29. The Goals of Security






30. Remote Desktop port number






31. IPSEC Encryption Modes






32. Can a VLAN provide scalability?






33. What is the standard that covers PKI?






34. What do digital signatures prove?






35. The 3 As






36. Types of Firewalls






37. What is a Trojan?






38. HTTP port number






39. Windows Password Authentication Protocols






40. How do you ensure an email comes from the person it advertises as being the sender?






41. When was NTLMv2 first introduced?






42. How does an incremental backup work?






43. IMAP port number






44. NNTP port number






45. How could a shared virtual machine reduce the workload for IT staff?






46. What is UBE?






47. Goals of Email Security






48. How does an online/double conversion UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


49. User Account Control (UAC) is an Example of






50. Examples of Social Engineering Attacks