SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Firewall with several NICs connected to different networks
stateful inspection
multi homed
firewalls
private
2. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
passive
port address translation
DMZ
49 -152 - 65 -535
3. Network configuration that permits selected outsiders access internal information systems
bastion host
spoofing
extranet
cat5
4. A packet filtering firewall works at this layer of the OSI model
VLAN
network
multiple interface firewall
PBX (Private Branch Exchange)
5. Dynamic / private ports
honeynet
49 -152 - 65 -535
twisted pair
SYN flood
6. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
stateful inspection
layered
NIDS
screened subnet
7. A pool of public IP addresses is shared by a collection of private IP addresses
dynamic NAT
hub
PBX (Private Branch Exchange)
subnet
8. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
proxy
active
NIDS
tcp/ip hijacking
9. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
bastion host
application gateway
null session
passive
10. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
packet filter
cat3
active
twisted pair
11. Protocol used to map an known IP address to its corresponding media access control (MAC) address
coaxial
ARP
layered
port address translation
12. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
port
DMZ
knowledge based
firewall architectures
13. Twisted pair cable with speed capability of 1Gbps
proxy server
cat5
land attack
active
14. IPS response method - terminate process/session - block/reject and redirect network traffic
ARP
screened subnet
allow by default
active
15. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
man in the middle and replay
10Base5
active
port address translation
16. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
stateful inspection
IP spoofing
0 - 1023
screened host
17. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
honeynet
active
spoofing attacks
18. Bbenign activity reported as malicious
replay
store and forward
land attack
false positive
19. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
teardrop
NIDS
DoS attacks
packet filter
20. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
man in the middle
passive
fiber optic
firewall architectures
21. A sniffer mode used to capture traffic addressed to/from another machine on the network
promiscuous
ping of death
PBX (Private Branch Exchange)
informed
22. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
website spoofing
0 - 1023
firewall architectures
twisted pair
23. Forging an IP address with the address of a trusted host
SYN flood
man in the middle and replay
IP spoofing
replay
24. A set of rules computers use to communicate with each other across a network
tcp/ip hijacking
application
protocol
VLAN
25. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
deny by default
DNS spoofing
repeater
ARP
26. IP spoofing attack where the attacker can only send packets and has to guess about replies
honeypot
split horizon DNS
blind
firewalls
27. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
replay
firewalls
DNS spoofing
application gateway
28. Head of a packet contains...
NIDS
proxy
packet filter
source - destination - protocol
29. Evolved from IDS - monitors network traffic - detects and responds to attack on network
PBX (Private Branch Exchange)
allow by default
NIPS
49 -152 - 65 -535
30. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
spoofing
honeypot
risk mitigation
proxy
31. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
router
screened subnet
DoS attacks
fiber optic
32. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
HIDS
protocol analyzer
screened host
coaxial
33. Amplifies the signal of incoming packets before broadcasting them to the network
repeater
screened host
DoS attacks
false positive
34. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
subnet
multiple interface firewall
encrypt session key
application
35. Examines a entire packet and determines action based on a complex set of rules
0 - 1023
switch
application gateway
protocol analyzer
36. A logical connection point allowing computers and software to communicate and exchange data
port
layered
session hijacking
49 -152 - 65 -535
37. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
split horizon DNS
application gateway
stateful inspection
application
38. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
session hijacking
proxy server
active
application gateway
39. Session hijacking countermeasure
encrypt session key
IP spoofing
behavior based
replay
40. A variation of a smurf attack using UDP
layered
fraggle
session hijacking
SYN flood
41. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
promiscuous
knowledge based
port
behavior based
42. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
broadcast domain
teardrop
session hijacking
subnet
43. Allows all traffic except traffic that is specifically denied - also known as permissive access
source - destination - protocol
fiber optic
application
allow by default
44. Man in the middle attack where the content of an intercepted message is altered before it is sent on
active
screened subnet
knowledge based
false positive
45. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
DMZ
deny by default
coaxial
NIDS
46. Used to pass data from one VLAN to another
active
router
land attack
firewalls
47. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
router
passive
10Base5
firewall architectures
48. IDS response method using logging and notification
passive
honeypot
1024 - 49 -151
subnet
49. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
dynamic NAT
informed
fiber optic
split horizon DNS
50. Collection on honeypots
honeynet
NIPS
NIDS
null session