Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPSEC Encryption Modes






2. DHCP port number






3. What is THC Hydra?






4. PPTP port number






5. When was NTLMv2 first introduced?






6. Can a VLAN be used to SEGREGATE access to a DHCP server?






7. How could a shared virtual machine reduce the workload for IT staff?






8. HTTPS port number






9. Secure Email Protocols






10. LDAP port number






11. Remote Desktop port number






12. Steps in the OVAL Assessment Process






13. What is a Zombie?






14. How can you identify a SQL Injection attack?






15. Can a VLAN provide scalability?






16. DNS port number






17. The Primary Causes of Compromised Security






18. In PKI what is the name of the file that tracks expired certificates?






19. Symmetric Key Ciphers






20. A web server that is located outside the DMZ is known as a...






21. How does an incremental backup work?






22. TACACS port number






23. What is a hotfix?






24. What is output validation?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


25. Windows Password Authentication Protocols






26. In Windows what is the path to the file that contains a list of well-known ports?






27. Human Behaviors that Social Engineering Will Exploit






28. Goals of Email Security






29. In a Windows Doamin - How is a GPO Applied?






30. How does the MAC model work?






31. How does an online/double conversion UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


32. Versions of NAT






33. Telnet port number






34. IMAP port number






35. Types of Firewalls






36. Checksums






37. Access Control Models






38. HTTP port number






39. Does PGP rely on X.509 (Digital Certificates - PKI)?






40. Password Crackers






41. UPS Types






42. Weaknesses of Antivirus Software






43. What is the standard that covers LDAP?






44. Symmetric Key Ciphers






45. Protocols Used for VPN






46. Types of L2TP Tunnels






47. How do you ensure an email comes from the person it advertises as being the sender?






48. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






49. The 3 As






50. IDS/IPS Alerts