Comprehensive study tool covering all 5 domains. Use flashcards to build knowledge, take the practice exam to test yourself, and reference the quick-ref tables during review. Exam cut score: 750/900.
Click a card to reveal the answer. Use ← → to navigate. Mark cards Known/Review to track progress.
50 questions across all 5 domains. Passing score: 75% (38/50). Timer optional.
Select exam mode and difficulty. Questions are randomized from our question bank.
50 questions, all domains, timed
25 questions, untimed
20 questions from one domain
Retake only questions you got wrong
Essential tables and charts for exam day review.
| Port | Protocol | Transport | Notes |
|---|---|---|---|
| 20/21 | FTP | TCP | File Transfer Protocol — 20 data, 21 control. Unencrypted. |
| 22 | SSH / SCP / SFTP | TCP | Secure Shell. Encrypted remote access and secure file transfer. |
| 23 | Telnet | TCP | Unencrypted remote terminal. Replaced by SSH. |
| 25 | SMTP | TCP | Simple Mail Transfer Protocol. Email sending (unencrypted). |
| 53 | DNS | TCP/UDP | Domain Name System. UDP for queries, TCP for zone transfers. |
| 67/68 | DHCP | UDP | Dynamic Host Config. 67 = server, 68 = client. |
| 69 | TFTP | UDP | Trivial FTP — no auth, used for booting (PXE). |
| 80 | HTTP | TCP | Unencrypted web traffic. |
| 88 | Kerberos | TCP/UDP | Authentication protocol for Active Directory. |
| 110 | POP3 | TCP | Post Office Protocol v3. Email retrieval, downloads & deletes. |
| 119 | NNTP | TCP | Network News Transfer Protocol. |
| 123 | NTP | UDP | Network Time Protocol. Critical for Kerberos & log correlation. |
| 135 | RPC | TCP | Microsoft Remote Procedure Call / WMI. |
| 137-139 | NetBIOS | TCP/UDP | Legacy Windows networking. Often blocked at firewall. |
| 143 | IMAP | TCP | Internet Message Access Protocol. Email stays on server. |
| 161/162 | SNMP | UDP | Network monitoring. 161 agent, 162 traps. Use v3 (encrypted). |
| 389 | LDAP | TCP/UDP | Lightweight Directory Access Protocol — unencrypted. |
| 443 | HTTPS | TCP | HTTP over TLS. Standard secure web traffic. |
| 445 | SMB | TCP | Server Message Block. Windows file sharing. EternalBlue target. |
| 465/587 | SMTPS | TCP | SMTP over TLS. 587 preferred (STARTTLS). |
| 514 | Syslog | UDP | System logging. Sends logs to SIEM. TCP 6514 for TLS. |
| 636 | LDAPS | TCP | LDAP over TLS. Secure directory queries. |
| 993 | IMAPS | TCP | IMAP over TLS. |
| 995 | POP3S | TCP | POP3 over TLS. |
| 1433 | MSSQL | TCP | Microsoft SQL Server. |
| 1521 | Oracle DB | TCP | Oracle Database listener. |
| 3306 | MySQL | TCP | MySQL / MariaDB database. |
| 3389 | RDP | TCP | Remote Desktop Protocol. High-value attack target. Requires NLA. |
| 5060/5061 | SIP | TCP/UDP | VoIP signaling. 5061 = TLS. |
| 8080/8443 | HTTP Alt | TCP | Alternate HTTP/HTTPS ports for web proxies or dev servers. |
| Algorithm | Type | Key Size | Use Case / Notes |
|---|---|---|---|
| AES | SYMMETRIC | 128, 192, 256-bit | Block cipher. AES-256 is the gold standard. Used in TLS, disk encryption. |
| 3DES (TDEA) | SYMMETRIC | 112/168-bit | Legacy — deprecated. 3x DES. Still seen in legacy POS systems. |
| Blowfish/Twofish | SYMMETRIC | 32–448 / 128–256 | Block ciphers. Twofish was AES finalist. Used in bcrypt. |
| ChaCha20 | SYMMETRIC | 256-bit | Stream cipher. Fast in software; used in TLS 1.3 as alternative to AES. |
| RC4 | SYMMETRIC | 40–2048 | Stream cipher. DEPRECATED — broken in WEP, TLS. Do not use. |
| RSA | ASYMMETRIC | 2048–4096-bit | Key exchange, digital signatures. Slow — used to exchange symmetric keys. |
| ECC | ASYMMETRIC | 256-bit ≈ RSA-3072 | Elliptic Curve. Smaller keys, same strength. Used in mobile, IoT, TLS. |
| Diffie-Hellman | ASYMMETRIC | 2048+ bits | Key exchange only. DHE adds ephemeral (forward secrecy). |
| ECDH / ECDHE | ASYMMETRIC | 256+ bits | ECC-based DH. ECDHE = ephemeral = perfect forward secrecy. |
| DSA / ECDSA | ASYMMETRIC | 1024–3072 / 256+ | Digital Signature Algorithm. ECDSA preferred (smaller, faster). |
| MD5 | HASH | 128-bit output | BROKEN — collision vulnerabilities. Never use for security. |
| SHA-1 | HASH | 160-bit output | DEPRECATED — collision found in 2017. Use SHA-2+. |
| SHA-256 / SHA-3 | HASH | 256-bit output | Current standard. SHA-256 = SHA-2 family. SHA-3 = Keccak algorithm. |
| HMAC | HASH | Depends on hash | Hash-based MAC — adds secret key to hash for integrity + auth. |
| PBKDF2 | HASH | Variable | Password-Based Key Derivation. Salted + iterated. FIPS-approved. |
| bcrypt / Argon2 | HASH | Variable | Password hashing. Argon2 is winner of Password Hashing Competition. |
| TLS 1.3 | PROTOCOL | N/A | Current TLS standard. Removes weak cipher suites. Mandatory ECDHE/DHE. |
| IPSec | PROTOCOL | N/A | Layer 3 VPN. AH (integrity only) + ESP (encryption + integrity). |
| Tool | Category | Purpose |
|---|---|---|
| Wireshark | Network Analysis | GUI packet capture and analysis. Deep packet inspection. |
| tcpdump | Network Analysis | CLI packet capture. Lightweight, scriptable, used on Linux/Unix. |
| Nmap | Scanning | Network port scanner. OS fingerprinting, service version detection. |
| Nessus | Vulnerability Scanner | Commercial. Authenticated scanning, CVE mapping, compliance. |
| OpenVAS | Vulnerability Scanner | Open-source vulnerability scanning framework. |
| Metasploit | Exploitation | Framework for developing and launching exploits. Pen testing. |
| Burp Suite | Web App Testing | Web proxy for intercepting, modifying, and testing HTTP(S) traffic. |
| John the Ripper | Password Cracking | Offline password cracker. Wordlists, brute force, rules. |
| Hashcat | Password Cracking | GPU-accelerated password cracking. Rainbow tables, hybrid attacks. |
| Aircrack-ng | Wireless | WEP/WPA cracking, packet injection, wireless auditing. |
| Autopsy / FTK | Forensics | Digital forensics platforms. File recovery, timeline analysis. |
| Volatility | Forensics | Memory forensics framework. Analyze RAM dumps. |
| Snort / Suricata | IDS/IPS | Open-source network intrusion detection/prevention. |
| Splunk | SIEM | Log aggregation, correlation, alerting. Industry-standard SIEM. |
| CrowdStrike Falcon | EDR/XDR | Endpoint detection and response. Behavioral analysis. |
| SET (Social Engineer Toolkit) | Social Engineering | Automates phishing, credential harvesting attacks for testing. |
| Shodan | OSINT | Search engine for internet-facing devices and services. |
| Maltego | OSINT | Link analysis and data mining for threat intelligence. |
| netstat | Network Utility | Display active connections, listening ports, routing tables. |
| tracert/traceroute | Network Utility | Map network path to destination, identify routing issues. |
Condensed study notes organized by domain. Click any domain to jump directly.
The CIA Triad is the foundation of security: Confidentiality (prevent disclosure), Integrity (prevent modification), Availability (ensure access). Add Non-repudiation as a 4th principle — digital signatures ensure someone cannot deny an action.
Authentication — Proving identity (who are you?)
Authorization — What are you allowed to do?
Service Models
Deployment Models
Risk Treatment Options:
All critical Security+ acronyms. Type to filter instantly.