Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. LDAP port number






2. PPTP port number






3. In a Windows Doamin - How is a GPO Applied?






4. How can you identify a SQL Injection attack?






5. SMTP port number






6. DHCP port number






7. IDS/IPS Alerts






8. User Account Control (UAC) is an Example of






9. Remote Desktop port number






10. The Primary Causes of Compromised Security






11. Can PGP be used to provide nonrepudiation?






12. Asymmetric Key Ciphers






13. What is a Zombie?






14. The Goals of Security






15. Types of L2TP Tunnels






16. What is UBE?






17. How could a shared virtual machine reduce the workload for IT staff?






18. What is the name of Vista's hard drive encryption technology?






19. Asymmetric Key Ciphers






20. The 3 Ss






21. Can a VLAN provide scalability?






22. Symmetric Key Ciphers






23. The 3 As






24. Protocols Used for VPN






25. HTTPS port number






26. What is the standard that covers LDAP?






27. How does a differential backup work?






28. Versions of NAT






29. What do digital signatures prove?






30. UPS Types






31. What is output validation?


32. What is the SLE (Single Loss Expectancy)?






33. L2TP port number






34. What is a Rootkit?






35. How does an incremental backup work?






36. Human Behaviors that Social Engineering Will Exploit






37. Windows Password Authentication Protocols






38. TACACS port number






39. What formula is used to find the number of hosts?






40. DNS port number






41. Types of Firewalls






42. Do all hosts on a VLAN have to be connected to the same switch?






43. How do you ensure an email comes from the person it advertises as being the sender?






44. How does an offline UPS provide power?


45. POP3 port number






46. IPSEC Encryption Modes






47. NNTP port number






48. Access Control Models






49. How does the MAC model work?






50. What is a Trojan?