Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the standard that covers PKI?






2. PPTP port number






3. POP3 port number






4. How does an incremental backup work?






5. Ways to Secure a WiFi Access Point






6. Can a VLAN provide scalability?






7. Weaknesses of Antivirus Software






8. HTTPS port number






9. IPSEC Encryption Modes






10. What formula is used to find the number of hosts?






11. NNTP port number






12. HTTP port number






13. Goals of Email Security






14. What is a hotfix?






15. Examples of Social Engineering Attacks






16. How does a differential backup work?






17. Protocols Used for VPN






18. Storage Types






19. IDS/IPS Alerts






20. What is a Zombie?






21. What is PWDUMP?






22. What is a Trojan?






23. What is UBE?






24. Symmetric Key Ciphers






25. Can PGP be used to provide nonrepudiation?






26. Remote Desktop port number






27. What do digital signatures prove?






28. What is output validation?


29. Types of Firewalls






30. The 3 Ss






31. Password Crackers






32. How do you ensure an email comes from the person it advertises as being the sender?






33. IMAP port number






34. Telnet port number






35. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






36. Windows Password Authentication Protocols






37. What is the difference between an online UPS and a double conversion UPS?






38. UPS Types






39. User Account Control (UAC) is an Example of






40. The 3 As






41. TACACS port number






42. Does PGP rely on X.509 (Digital Certificates - PKI)?






43. Human Behaviors that Social Engineering Will Exploit






44. What is the SLE (Single Loss Expectancy)?






45. DNS port number






46. In a Windows Doamin - How is a GPO Applied?






47. A web server that is located outside the DMZ is known as a...






48. Steps in the OVAL Assessment Process






49. When was NTLMv2 first introduced?






50. Types of L2TP Tunnels