Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. User Account Control (UAC) is an Example of






2. Symmetric Key Ciphers






3. Steps in the OVAL Assessment Process






4. Symmetric Key Ciphers






5. HTTPS port number






6. Do all hosts on a VLAN have to be connected to the same switch?






7. How can you identify a SQL Injection attack?






8. Windows Password Authentication Protocols






9. What is a Rootkit?






10. In PKI what is the name of the file that tracks expired certificates?






11. TACACS port number






12. DNS port number






13. Goals of Email Security






14. HTTP port number






15. The 3 As






16. What is a Zombie?






17. How does a differential backup work?






18. NNTP port number






19. What do digital signatures prove?






20. Asymmetric Key Ciphers






21. SMTP port number






22. How does the MAC model work?






23. Telnet port number






24. Types of L2TP Tunnels






25. What is PWDUMP?






26. Does PGP rely on X.509 (Digital Certificates - PKI)?






27. How do you ensure an email comes from the person it advertises as being the sender?






28. Weaknesses of Antivirus Software






29. Human Behaviors that Social Engineering Will Exploit






30. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






31. What is the SLE (Single Loss Expectancy)?






32. Asymmetric Key Ciphers






33. Ways to Secure a WiFi Access Point






34. When was NTLMv2 first introduced?






35. Can PGP be used to provide nonrepudiation?






36. How does an incremental backup work?






37. What is the standard that covers LDAP?






38. What is the standard that covers PKI?






39. SSH port number






40. What is the name of Vista's hard drive encryption technology?






41. LDAP port number






42. What is THC Hydra?






43. Protocols Used for VPN






44. In a Windows Doamin - How is a GPO Applied?






45. IPSEC Encryption Modes






46. The Primary Causes of Compromised Security






47. How does an offline UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. What formula is used to find the number of hosts?






49. DHCP port number






50. Checksums







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests