SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Twisted pair cable with speed capability of 1Gbps
firewalls
cat5
null session
spoofing
2. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
null session
man in the middle and replay
defense in depth
NIDS
3. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
protocol analyzer
spoofing
null session
screened host
4. IP - email - website - DNS - and ARP
man in the middle
spoofing attacks
dual homed
split horizon DNS
5. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
router
router
blind
SYN flood
6. Protocol used to map an known IP address to its corresponding media access control (MAC) address
spoofing
ARP
twisted pair
knowledge based
7. Acts as an organizations internal phone system
proxy server
zone transfer
network
PBX (Private Branch Exchange)
8. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
stateful inspection
honeypot
ping flooding
IP spoofing
9. Attempt to block service or reduce activity by overloading the victim machine with ping requests
ping flooding
NIDS
subnet
10Base5
10. Dynamic / private ports
49 -152 - 65 -535
content filter
twisted pair
website spoofing
11. Firewall with several NICs connected to different networks
screened host
static NAT
multi homed
repeater
12. Known as thicknet - 10mbps - limited to 500 meters
10Base5
smurf
active
allow by default
13. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
port
0 - 1023
NIDS
null session
14. Head of a packet contains...
source - destination - protocol
tcp/ip hijacking
fraggle
repeater
15. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
null session
HIDS
cat5
NIDS network connections
16. A packet filtering firewall works at this layer of the OSI model
honeypot
router
network
application gateway
17. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
source - destination - protocol
firewall architectures
proxy
router
18. Used to pass data from one VLAN to another
stateful inspection
fraggle
router
protocol
19. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
switch
fiber optic
IP spoofing
dual homed
20. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
VLAN
coaxial
port address translation
firewalls
21. A sniffer mode used to capture traffic addressed to/from another machine on the network
NIPS
protocol
promiscuous
10base2
22. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
10base2
packet filter
man in the middle
application gateway
23. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
defense in depth
content filter
switch
ping flooding
24. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
informed
bastion host
man in the middle and replay
coaxial
25. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
source - destination - protocol
NAT
application gateway
26. Packet filtering - proxies - stateful inspection
land attack
firewalls
spoofing attacks
cat5
27. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
repeater
passive
port address translation
twisted pair
28. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
firewalls
NIPS
application
null session
29. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
behavior based
source - destination - protocol
twisted pair
DNS spoofing
30. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
website spoofing
packet filter
passive
router
31. User / registered ports
cat3
1024 - 49 -151
defense in depth
ping of death
32. Forging an IP address with the address of a trusted host
deny by default
multiple interface firewall
null session
IP spoofing
33. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
IP spoofing
multi homed
screened host
firewalls
34. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
1024 - 49 -151
ping of death
VLAN
dynamic NAT
35. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
promiscuous
source - destination - protocol
bastion host
proxy server
36. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
extranet
router
split horizon DNS
honeypot
37. Session hijacking countermeasure
1024 - 49 -151
blind
encrypt session key
switch
38. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
packet filter
knowledge based
private
ARP
39. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
dynamic NAT
encrypt session key
VLAN
router
40. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
multi homed
risk mitigation
proxy
blind
41. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
switch
smurf
NIDS network connections
screened subnet
42. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
switch
layered
proxy server
43. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
stateful inspection
session hijacking
VLAN
behavior based
44. Bbenign activity reported as malicious
knowledge based
land attack
false positive
10base2
45. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
informed
1024 - 49 -151
NIDS
defense in depth
46. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
NIDS network connections
DMZ
blind
passive
47. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
dual homed
firewalls
10base2
passive
48. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
dynamic NAT
active
router
DNS spoofing
49. A variation of a smurf attack using UDP
router
fraggle
tcp/ip hijacking
encrypt session key
50. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
IP spoofing
session hijacking
stateful inspection
0 - 1023