Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can PGP be used to provide nonrepudiation?






2. DHCP port number






3. Versions of NAT






4. What is the difference between an online UPS and a double conversion UPS?






5. Can a VLAN provide scalability?






6. What is a hotfix?






7. UPS Types






8. What is a Rootkit?






9. What is PWDUMP?






10. Symmetric Key Ciphers






11. How could a shared virtual machine reduce the workload for IT staff?






12. Can a VLAN be used to SEGREGATE access to a DHCP server?






13. Symmetric Key Ciphers






14. Windows Password Authentication Protocols






15. Human Behaviors that Social Engineering Will Exploit






16. What is the SLE (Single Loss Expectancy)?






17. How do you ensure an email comes from the person it advertises as being the sender?






18. Types of Firewalls






19. SMTP port number






20. Checksums






21. How does the MAC model work?






22. In PKI what is the name of the file that tracks expired certificates?






23. What do digital signatures prove?






24. Access Control Models






25. Goals of Email Security






26. Password Attacks






27. HTTP port number






28. L2TP port number






29. The Goals of Security






30. In Windows what is the path to the file that contains a list of well-known ports?






31. Storage Types






32. What formula is used to find the number of hosts?






33. What is output validation?


34. POP3 port number






35. How does an offline UPS provide power?


36. In a Windows Doamin - How is a GPO Applied?






37. Does PGP rely on X.509 (Digital Certificates - PKI)?






38. Asymmetric Key Ciphers






39. SSH port number






40. The 3 As






41. Protocols Used for VPN






42. What is the standard that covers LDAP?






43. Examples of Social Engineering Attacks






44. What is the name of Vista's hard drive encryption technology?






45. PPTP port number






46. How can you identify a SQL Injection attack?






47. How does a differential backup work?






48. IDS/IPS Alerts






49. Do all hosts on a VLAN have to be connected to the same switch?






50. DNS port number