Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does an incremental backup work?






2. How does a differential backup work?






3. What formula is used to find the number of hosts?






4. L2TP port number






5. Types of L2TP Tunnels






6. PPTP port number






7. Secure Email Protocols






8. NNTP port number






9. What is the standard that covers PKI?






10. What is a hotfix?






11. How does an online/double conversion UPS provide power?


12. Weaknesses of Antivirus Software






13. Password Crackers






14. What is a Rootkit?






15. What is UBE?






16. Asymmetric Key Ciphers






17. The 3 Ss






18. How can you identify a SQL Injection attack?






19. Telnet port number






20. Access Control Models






21. UPS Types






22. Checksums






23. What is the name of Vista's hard drive encryption technology?






24. What is THC Hydra?






25. DNS port number






26. In a Windows Doamin - How is a GPO Applied?






27. How does an offline UPS provide power?


28. Goals of Email Security






29. Ways to Secure a WiFi Access Point






30. In PKI what is the name of the file that tracks expired certificates?






31. How do you ensure an email comes from the person it advertises as being the sender?






32. The 3 As






33. Versions of NAT






34. Windows Password Authentication Protocols






35. Storage Types






36. What is output validation?


37. Human Behaviors that Social Engineering Will Exploit






38. What is the SLE (Single Loss Expectancy)?






39. Types of Firewalls






40. Can a VLAN be used to SEGREGATE access to a DHCP server?






41. What is a Trojan?






42. Remote Desktop port number






43. The Goals of Security






44. POP3 port number






45. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?






46. Do all hosts on a VLAN have to be connected to the same switch?






47. What is PWDUMP?






48. Asymmetric Key Ciphers






49. What do digital signatures prove?






50. HTTPS port number