Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What formula is used to find the number of hosts?






2. Types of Firewalls






3. Password Crackers






4. What is UBE?






5. Checksums






6. HTTPS port number






7. Asymmetric Key Ciphers






8. When was NTLMv2 first introduced?






9. Telnet port number






10. The Goals of Security






11. The 3 Ss






12. Asymmetric Key Ciphers






13. What is a hotfix?






14. Symmetric Key Ciphers






15. SMTP port number






16. Can a VLAN be used to SEGREGATE access to a DHCP server?






17. What is the standard that covers PKI?






18. What is a Rootkit?






19. How does an offline UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. HTTP port number






21. Password Attacks






22. Weaknesses of Antivirus Software






23. User Account Control (UAC) is an Example of






24. Ways to Secure a WiFi Access Point






25. DHCP port number






26. How does an online/double conversion UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


27. The Primary Causes of Compromised Security






28. Human Behaviors that Social Engineering Will Exploit






29. How does a differential backup work?






30. The 3 As






31. PPTP port number






32. Versions of NAT






33. In Windows what is the path to the file that contains a list of well-known ports?






34. NNTP port number






35. Steps in the OVAL Assessment Process






36. What is a Zombie?






37. Remote Desktop port number






38. How could a shared virtual machine reduce the workload for IT staff?






39. IPSEC Encryption Modes






40. Do all hosts on a VLAN have to be connected to the same switch?






41. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






42. What is output validation?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


43. Windows Password Authentication Protocols






44. How do you ensure an email comes from the person it advertises as being the sender?






45. SSH port number






46. Examples of Social Engineering Attacks






47. What is PWDUMP?






48. What is the name of Vista's hard drive encryption technology?






49. In PKI what is the name of the file that tracks expired certificates?






50. Can a VLAN provide scalability?