SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
subnet
NIDS network connections
extranet
HIDS
2. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
land attack
packet filter
spoofing
split horizon DNS
3. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
bastion host
0 - 1023
NIDS
dual homed
4. Bbenign activity reported as malicious
multiple interface firewall
false positive
screened host
dynamic NAT
5. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
49 -152 - 65 -535
proxy
network
SYN flood
6. Examines a entire packet and determines action based on a complex set of rules
stateful inspection
application gateway
behavior based
passive
7. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
passive
IP spoofing
private
dual homed
8. An attacker redirects traffic by falsifying the IP address requested by ARP request
SYN flood
ARP poisoning
website spoofing
proxy
9. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
DMZ
session hijacking
land attack
bastion host
10. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
blind
null session
VLAN
fiber optic
11. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
informed
passive
port address translation
screened subnet
12. IDS that relies on the identification of known attack signatures
knowledge based
active
DoS attacks
man in the middle
13. A sniffer mode used to capture traffic addressed to/from another machine on the network
NAT
dynamic NAT
behavior based
promiscuous
14. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
defense in depth
fiber optic
smurf
content filter
15. Forging an IP address with the address of a trusted host
teardrop
IP spoofing
split horizon DNS
VLAN
16. A set of rules computers use to communicate with each other across a network
blind
port address translation
ARP
protocol
17. Amplifies the signal of incoming packets before broadcasting them to the network
repeater
blind
port address translation
land attack
18. An application layer gateway works at this layer of the OSI model
proxy server
ARP poisoning
protocol analyzer
application
19. Twisted pair cable with speed capability of 1Gbps
cat5
honeynet
proxy
behavior based
20. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
10Base5
hub
switch
layered
21. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
land attack
proxy
DMZ
honeynet
22. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
firewall architectures
honeypot
hub
NIDS network connections
23. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
NIPS
broadcast domain
subnet
cat5
24. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
firewalls
ping flooding
DoS attacks
ARP
25. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
IP spoofing
switch
application
passive
26. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
spoofing
promiscuous
behavior based
man in the middle and replay
27. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
knowledge based
IP spoofing
proxy
session hijacking
28. Used to pass data from one VLAN to another
ARP poisoning
website spoofing
defense in depth
router
29. Collection on honeypots
network
NIDS network connections
SYN flood
honeynet
30. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
VLAN
IP spoofing
proxy
cat3
31. Level 2 firewall often used to filter web traffic
active
proxy
spoofing
behavior based
32. Network configuration that permits selected outsiders access internal information systems
application
passive
extranet
content filter
33. Attempt to block service or reduce activity by overloading the victim machine with ping requests
passive
1024 - 49 -151
ping flooding
PBX (Private Branch Exchange)
34. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
spoofing
application
stateful inspection
protocol analyzer
35. Evolved from IDS - monitors network traffic - detects and responds to attack on network
DoS attacks
NIPS
deny by default
land attack
36. Known as thicknet - 10mbps - limited to 500 meters
ARP
10Base5
land attack
proxy server
37. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
active
source - destination - protocol
subnet
encrypt session key
38. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
proxy server
fraggle
10base2
teardrop
39. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
replay
man in the middle
NIDS
hub
40. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
proxy
hub
spoofing attacks
passive
41. Known as thinnet - 10mbps - limited to 185 meters
protocol analyzer
10base2
land attack
fraggle
42. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
10base2
IP spoofing
promiscuous
firewalls
43. IDS response method using logging and notification
ARP
passive
informed
SYN flood
44. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
subnet
DMZ
switch
10base2
45. IP spoofing attack where the attacker can only send packets and has to guess about replies
ping flooding
NIDS network connections
blind
fraggle
46. Session hijacking countermeasure
replay
coaxial
IP spoofing
encrypt session key
47. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
website spoofing
land attack
IP spoofing
network
48. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
knowledge based
deny by default
0 - 1023
PBX (Private Branch Exchange)
49. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
HIDS
split horizon DNS
deny by default
repeater
50. Firewall with several NICs connected to different networks
NIDS
multi homed
split horizon DNS
packet filter