Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TACACS port number






2. Examples of Social Engineering Attacks






3. How does an offline UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


4. What formula is used to find the number of hosts?






5. How does an incremental backup work?






6. PPTP port number






7. Goals of Email Security






8. Symmetric Key Ciphers






9. Asymmetric Key Ciphers






10. What is a hotfix?






11. How can you identify a SQL Injection attack?






12. Telnet port number






13. What is a Trojan?






14. UPS Types






15. DHCP port number






16. Symmetric Key Ciphers






17. Ways to Secure a WiFi Access Point






18. Password Attacks






19. User Account Control (UAC) is an Example of






20. What is UBE?






21. What is the standard that covers LDAP?






22. Can a VLAN be used to SEGREGATE access to a DHCP server?






23. Do all hosts on a VLAN have to be connected to the same switch?






24. How does a differential backup work?






25. Steps in the OVAL Assessment Process






26. The 3 Ss






27. What is a Rootkit?






28. What is the difference between an online UPS and a double conversion UPS?






29. What is THC Hydra?






30. Remote Desktop port number






31. POP3 port number






32. What is the standard that covers PKI?






33. IPSEC Encryption Modes






34. L2TP port number






35. HTTPS port number






36. Human Behaviors that Social Engineering Will Exploit






37. Types of Firewalls






38. Does PGP rely on X.509 (Digital Certificates - PKI)?






39. IMAP port number






40. What is a Zombie?






41. DNS port number






42. What is the name of Vista's hard drive encryption technology?






43. Storage Types






44. How could a shared virtual machine reduce the workload for IT staff?






45. A web server that is located outside the DMZ is known as a...






46. SMTP port number






47. Can a VLAN provide scalability?






48. HTTP port number






49. LDAP port number






50. The 3 As