1. What is the name of Vista's hard drive encryption technology?
2. Steps in the OVAL Assessment Process
3. What is PWDUMP?
4. . Ways to Secure a WiFi Access Point
5. Weaknesses of Antivirus Software
6. What is a Trojan?
7. Access Control Models
8. The 3 Ss
9. What is output validation?
10. DHCP port number
11. What is the difference between an online UPS and a double conversion UPS?
12. What is the SLE (Single Loss Expectancy)?
13. LDAP port number
14. Asymmetric Key Ciphers
15. IDS/IPS Alerts
16. Can PGP be used to provide nonrepudiation?
17. The 3 As
18. Checksums
19. Can a VLAN provide scalability?
20. How can you identify a SQL Injection attack?
21. In PKI what is the name of the file that tracks expired certificates?
22. Symmetric Key Ciphers
23. What formula is used to find the number of hosts?
24. SSH port number
25. IMAP port number
26. Remote Desktop port number
Comptia Security +: Assessment And Risk Mgmt
Comptia Security +: Cryptography
Comptia Security +: Cyber Ops
Comptia Security +: Domain2 Compliance And Organization Security
Comptia Security +: Domain4 Application Security
Comptia Security + Exam
Related MCQ's