SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A packet filtering firewall works at this layer of the OSI model
spoofing
network
broadcast domain
firewalls
2. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
blind
deny by default
firewalls
extranet
3. A pool of public IP addresses is shared by a collection of private IP addresses
firewall architectures
dynamic NAT
cat5
land attack
4. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
IP spoofing
router
1024 - 49 -151
risk mitigation
5. A complete transfer of all DNS zone information from one server to another
passive
49 -152 - 65 -535
zone transfer
switch
6. A variation of a smurf attack using UDP
dynamic NAT
session hijacking
defense in depth
fraggle
7. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
port address translation
split horizon DNS
IP spoofing
NIPS
8. Bbenign activity reported as malicious
ARP
1024 - 49 -151
stateful inspection
false positive
9. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
honeypot
null session
allow by default
informed
10. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
port
stateful inspection
router
subnet
11. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
risk mitigation
false positive
SYN flood
broadcast domain
12. IPS response method - terminate process/session - block/reject and redirect network traffic
active
twisted pair
NIDS
spoofing
13. Connects devices together to form a subnet - broadcasts incoming packets to all devices
NIDS network connections
hub
49 -152 - 65 -535
content filter
14. User / registered ports
cat3
1024 - 49 -151
blind
session hijacking
15. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
promiscuous
screened subnet
smurf
informed
16. Level 2 firewall often used to filter web traffic
NIPS
blind
false positive
proxy
17. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
passive
cat5
store and forward
repeater
18. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
subnet
router
DMZ
stateful inspection
19. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
dual homed
honeynet
null session
defense in depth
20. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
fiber optic
DMZ
repeater
ARP poisoning
21. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
cat3
dynamic NAT
multi homed
teardrop
22. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
layered
spoofing
man in the middle and replay
website spoofing
23. Known as thicknet - 10mbps - limited to 500 meters
allow by default
10Base5
NAT
active
24. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
encrypt session key
informed
store and forward
application gateway
25. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
IP spoofing
dual homed
stateful inspection
coaxial
26. IP - email - website - DNS - and ARP
ARP
spoofing attacks
IP spoofing
blind
27. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
NIDS
NIDS network connections
IP spoofing
DNS spoofing
28. Network configuration that permits selected outsiders access internal information systems
ping of death
DoS attacks
extranet
content filter
29. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
protocol analyzer
stateful inspection
SYN flood
HIDS
30. Attempt to block service or reduce activity by overloading the victim machine with ping requests
10Base5
teardrop
ping flooding
informed
31. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
IP spoofing
HIDS
49 -152 - 65 -535
screened host
32. A server that sits between an intranet and it's Internet connection - masking all IP addresses
encrypt session key
stateful inspection
proxy server
spoofing attacks
33. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
NIDS
10base2
tcp/ip hijacking
stateful inspection
34. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
blind
fiber optic
false positive
proxy
35. Malicious activity not reported or detected
session hijacking
coaxial
ARP poisoning
false negative
36. A set of rules computers use to communicate with each other across a network
protocol
extranet
application
stateful inspection
37. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
DoS attacks
man in the middle and replay
honeynet
screened subnet
38. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
DMZ
packet filter
coaxial
man in the middle and replay
39. Man in the middle attack where the content of an intercepted message is altered before it is sent on
NIPS
teardrop
active
protocol
40. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
active
DMZ
protocol analyzer
NIDS network connections
41. An application layer gateway works at this layer of the OSI model
router
application
informed
split horizon DNS
42. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
broadcast domain
blind
multiple interface firewall
protocol analyzer
43. Twisted pair cable with speed capability of 10Mbps
false negative
port
application gateway
cat3
44. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
coaxial
firewall architectures
subnet
spoofing attacks
45. Firewall with several NICs connected to different networks
allow by default
twisted pair
multi homed
switch
46. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
network
HIDS
twisted pair
proxy
47. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
spoofing attacks
protocol analyzer
VLAN
port
48. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
deny by default
informed
10Base5
extranet
49. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
split horizon DNS
10Base5
subnet
0 - 1023
50. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
port
dual homed
replay
session hijacking