SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
IP spoofing
ping of death
port address translation
spoofing
2. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
behavior based
encrypt session key
screened host
source - destination - protocol
3. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
passive
NIPS
null session
deny by default
4. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
proxy
session hijacking
application gateway
NAT
5. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
deny by default
IP spoofing
private
49 -152 - 65 -535
6. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
10base2
active
HIDS
passive
7. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
NIDS
multiple interface firewall
risk mitigation
spoofing
8. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
switch
promiscuous
NIDS
1024 - 49 -151
9. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
multi homed
dynamic NAT
defense in depth
behavior based
10. A logical connection point allowing computers and software to communicate and exchange data
port
0 - 1023
application
honeypot
11. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
screened subnet
ARP
fiber optic
hub
12. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
static NAT
active
cat5
stateful inspection
13. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
packet filter
protocol
SYN flood
14. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
blind
man in the middle
passive
NIDS
15. A server that sits between an intranet and it's Internet connection - masking all IP addresses
deny by default
proxy server
firewalls
IP spoofing
16. Acts as an organizations internal phone system
NIDS network connections
PBX (Private Branch Exchange)
router
honeynet
17. Protocol used to map an known IP address to its corresponding media access control (MAC) address
1024 - 49 -151
ARP
passive
session hijacking
18. Examines a entire packet and determines action based on a complex set of rules
DNS spoofing
port address translation
application gateway
coaxial
19. Evolved from IDS - monitors network traffic - detects and responds to attack on network
DoS attacks
defense in depth
source - destination - protocol
NIPS
20. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
switch
PBX (Private Branch Exchange)
stateful inspection
teardrop
21. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
split horizon DNS
firewall architectures
fiber optic
IP spoofing
22. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
0 - 1023
teardrop
multiple interface firewall
hub
23. Packet filtering - proxies - stateful inspection
replay
firewalls
bastion host
split horizon DNS
24. Known as thicknet - 10mbps - limited to 500 meters
10Base5
packet filter
spoofing
NIPS
25. Twisted pair cable with speed capability of 1Gbps
router
cat5
protocol analyzer
ARP
26. Malicious activity not reported or detected
fraggle
ARP
subnet
false negative
27. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
DMZ
passive
stateful inspection
null session
28. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
router
NIDS
IP spoofing
29. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
proxy server
switch
subnet
website spoofing
30. IDS response method using logging and notification
teardrop
replay
DoS attacks
passive
31. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
proxy
IP spoofing
repeater
32. An attacker redirects traffic by falsifying the IP address requested by ARP request
port address translation
ARP poisoning
coaxial
source - destination - protocol
33. One private IP address is mapped to one public IP address
static NAT
zone transfer
content filter
subnet
34. A complete transfer of all DNS zone information from one server to another
zone transfer
10Base5
subnet
split horizon DNS
35. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
ARP
deny by default
packet filter
source - destination - protocol
36. Bbenign activity reported as malicious
1024 - 49 -151
network
false positive
encrypt session key
37. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
null session
twisted pair
allow by default
smurf
38. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
dual homed
fraggle
bastion host
false negative
39. Used to pass data from one VLAN to another
router
firewalls
active
false positive
40. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
promiscuous
application
proxy
split horizon DNS
41. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
website spoofing
private
content filter
risk mitigation
42. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
passive
null session
firewalls
honeynet
43. Dynamic / private ports
49 -152 - 65 -535
ARP
layered
null session
44. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
multiple interface firewall
10Base5
risk mitigation
DNS spoofing
45. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
dual homed
VLAN
static NAT
man in the middle
46. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
firewalls
NIDS
dynamic NAT
man in the middle and replay
47. IP - email - website - DNS - and ARP
spoofing attacks
NIPS
knowledge based
hub
48. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
hub
allow by default
HIDS
broadcast domain
49. IP spoofing attack where the attacker can only send packets and has to guess about replies
defense in depth
cat3
blind
spoofing
50. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
hub
source - destination - protocol
extranet
SYN flood