Test your basic knowledge |

Comptia Security +

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How could a shared virtual machine reduce the workload for IT staff?






2. What is the name of Vista's hard drive encryption technology?






3. How does an offline UPS provide power?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


4. The Primary Causes of Compromised Security






5. Windows Password Authentication Protocols






6. IPSEC Encryption Modes






7. TACACS port number






8. Can a VLAN provide scalability?






9. Password Crackers






10. How does a differential backup work?






11. Can PGP be used to provide nonrepudiation?






12. Symmetric Key Ciphers






13. How does the MAC model work?






14. IMAP port number






15. User Account Control (UAC) is an Example of






16. When was NTLMv2 first introduced?






17. Goals of Email Security






18. LDAP port number






19. How do you ensure an email comes from the person it advertises as being the sender?






20. Secure Email Protocols






21. Password Attacks






22. Steps in the OVAL Assessment Process






23. Access Control Models






24. A web server that is located outside the DMZ is known as a...






25. UPS Types






26. Weaknesses of Antivirus Software






27. Storage Types






28. Does PGP rely on X.509 (Digital Certificates - PKI)?






29. NNTP port number






30. What is a Trojan?






31. What formula is used to find the number of hosts?






32. Versions of NAT






33. HTTP port number






34. What is PWDUMP?






35. Telnet port number






36. Protocols Used for VPN






37. How does an incremental backup work?






38. Human Behaviors that Social Engineering Will Exploit






39. What is a hotfix?






40. What is UBE?






41. How can you identify a SQL Injection attack?






42. What is the SLE (Single Loss Expectancy)?






43. Remote Desktop port number






44. What do digital signatures prove?






45. What is the difference between an online UPS and a double conversion UPS?






46. In PKI what is the name of the file that tracks expired certificates?






47. What is the standard that covers PKI?






48. Types of Firewalls






49. Do all hosts on a VLAN have to be connected to the same switch?






50. The 3 Ss