Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is THC Hydra?






2. The 3 Ss






3. SMTP port number






4. Asymmetric Key Ciphers






5. Symmetric Key Ciphers






6. How could a shared virtual machine reduce the workload for IT staff?






7. Goals of Email Security






8. In a Windows Doamin - How is a GPO Applied?






9. How does an offline UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


10. Versions of NAT






11. Access Control Models






12. Telnet port number






13. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






14. What is a Zombie?






15. IDS/IPS Alerts






16. DNS port number






17. What is a Rootkit?






18. PPTP port number






19. What do digital signatures prove?






20. Password Attacks






21. When was NTLMv2 first introduced?






22. TACACS port number






23. The 3 As






24. Types of L2TP Tunnels






25. Symmetric Key Ciphers






26. Remote Desktop port number






27. What is the SLE (Single Loss Expectancy)?






28. Can PGP be used to provide nonrepudiation?






29. HTTP port number






30. The Goals of Security






31. Protocols Used for VPN






32. Secure Email Protocols






33. What is the standard that covers PKI?






34. IMAP port number






35. A web server that is located outside the DMZ is known as a...






36. POP3 port number






37. DHCP port number






38. What is a hotfix?






39. Examples of Social Engineering Attacks






40. IPSEC Encryption Modes






41. HTTPS port number






42. Human Behaviors that Social Engineering Will Exploit






43. Checksums






44. LDAP port number






45. NNTP port number






46. Ways to Secure a WiFi Access Point






47. What is the name of Vista's hard drive encryption technology?






48. How does an incremental backup work?






49. In PKI what is the name of the file that tracks expired certificates?






50. How does an online/double conversion UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183