SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A sniffer mode used to capture traffic addressed to/from another machine on the network
promiscuous
network
IP spoofing
1024 - 49 -151
2. IDS response method using logging and notification
10base2
zone transfer
VLAN
passive
3. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
network
SYN flood
split horizon DNS
IP spoofing
4. IDS that relies on the identification of known attack signatures
informed
VLAN
active
knowledge based
5. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
coaxial
teardrop
source - destination - protocol
VLAN
6. Firewall with several NICs connected to different networks
stateful inspection
NIPS
multi homed
active
7. Amplifies the signal of incoming packets before broadcasting them to the network
IP spoofing
repeater
zone transfer
man in the middle
8. Connects devices together to form a subnet - broadcasts incoming packets to all devices
active
hub
source - destination - protocol
stateful inspection
9. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
broadcast domain
port
multi homed
bastion host
10. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
NIDS
twisted pair
passive
application gateway
11. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
subnet
defense in depth
spoofing attacks
private
12. A logical connection point allowing computers and software to communicate and exchange data
content filter
proxy server
defense in depth
port
13. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
switch
extranet
fraggle
passive
14. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
router
SYN flood
layered
fiber optic
15. Twisted pair cable with speed capability of 10Mbps
cat3
zone transfer
passive
multiple interface firewall
16. Evolved from IDS - monitors network traffic - detects and responds to attack on network
DoS attacks
NIPS
replay
firewalls
17. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
risk mitigation
NIDS network connections
behavior based
subnet
18. IP - email - website - DNS - and ARP
repeater
informed
spoofing attacks
firewall architectures
19. Malicious activity not reported or detected
stateful inspection
packet filter
allow by default
false negative
20. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
ping of death
land attack
stateful inspection
replay
21. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
allow by default
ARP
repeater
man in the middle
22. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
firewall architectures
49 -152 - 65 -535
HIDS
23. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
SYN flood
false positive
ping of death
layered
24. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
network
website spoofing
hub
smurf
25. Protocol used to map an known IP address to its corresponding media access control (MAC) address
broadcast domain
ARP
passive
0 - 1023
26. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
stateful inspection
spoofing
firewall architectures
DNS spoofing
27. Acts as an organizations internal phone system
PBX (Private Branch Exchange)
dynamic NAT
layered
allow by default
28. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
honeypot
cat5
static NAT
NIDS network connections
29. A server that sits between an intranet and it's Internet connection - masking all IP addresses
DoS attacks
proxy server
router
firewall architectures
30. Monitors network traffic to identify possible attacks
multiple interface firewall
ARP poisoning
NIDS
static NAT
31. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
split horizon DNS
10base2
proxy server
fraggle
32. Used to pass data from one VLAN to another
router
hub
switch
NIPS
33. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
0 - 1023
proxy
knowledge based
repeater
34. User / registered ports
bastion host
1024 - 49 -151
cat5
behavior based
35. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
coaxial
screened host
protocol analyzer
extranet
36. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
NIDS network connections
active
informed
repeater
37. Twisted pair cable with speed capability of 1Gbps
DMZ
static NAT
10base2
cat5
38. IP spoofing attack where the attacker can only send packets and has to guess about replies
blind
knowledge based
packet filter
smurf
39. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
router
NIPS
broadcast domain
coaxial
40. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
NIPS
stateful inspection
ARP poisoning
repeater
41. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
router
IP spoofing
risk mitigation
firewall architectures
42. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
NAT
DNS spoofing
extranet
passive
43. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
NIPS
store and forward
subnet
protocol analyzer
44. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
content filter
behavior based
teardrop
IP spoofing
45. Packet filtering - proxies - stateful inspection
risk mitigation
firewalls
informed
false negative
46. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
packet filter
subnet
VLAN
switch
47. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
risk mitigation
PBX (Private Branch Exchange)
broadcast domain
promiscuous
48. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
risk mitigation
ARP
packet filter
coaxial
49. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
application gateway
stateful inspection
man in the middle
fiber optic
50. A variation of a smurf attack using UDP
firewalls
honeypot
fraggle
extranet