Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In PKI what is the name of the file that tracks expired certificates?






2. PPTP port number






3. What is a hotfix?






4. Checksums






5. In a Windows Doamin - How is a GPO Applied?






6. What is a Rootkit?






7. What is output validation?


8. Password Crackers






9. User Account Control (UAC) is an Example of






10. What is the standard that covers PKI?






11. Does PGP rely on X.509 (Digital Certificates - PKI)?






12. Secure Email Protocols






13. L2TP port number






14. When was NTLMv2 first introduced?






15. HTTPS port number






16. How does the MAC model work?






17. How can you identify a SQL Injection attack?






18. Examples of Social Engineering Attacks






19. What is the standard that covers LDAP?






20. Types of L2TP Tunnels






21. Versions of NAT






22. The Primary Causes of Compromised Security






23. What is UBE?






24. How does a differential backup work?






25. Can PGP be used to provide nonrepudiation?






26. Types of Firewalls






27. In Windows what is the path to the file that contains a list of well-known ports?






28. Do all hosts on a VLAN have to be connected to the same switch?






29. What is a Trojan?






30. How do you ensure an email comes from the person it advertises as being the sender?






31. IPSEC Encryption Modes






32. Can a VLAN be used to SEGREGATE access to a DHCP server?






33. The Goals of Security






34. Asymmetric Key Ciphers






35. Weaknesses of Antivirus Software






36. What is the difference between an online UPS and a double conversion UPS?






37. TACACS port number






38. A web server that is located outside the DMZ is known as a...






39. What is the name of Vista's hard drive encryption technology?






40. SMTP port number






41. Goals of Email Security






42. The 3 As






43. What is PWDUMP?






44. DNS port number






45. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






46. POP3 port number






47. What is the SLE (Single Loss Expectancy)?






48. The 3 Ss






49. Telnet port number






50. Storage Types