SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Forging an IP address with the address of a trusted host
passive
IP spoofing
tcp/ip hijacking
replay
2. A sniffer mode used to capture traffic addressed to/from another machine on the network
promiscuous
behavior based
informed
layered
3. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
private
deny by default
DNS spoofing
spoofing attacks
4. Man in the middle attack where the content of an intercepted message is altered before it is sent on
DNS spoofing
extranet
active
zone transfer
5. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
allow by default
switch
port address translation
static NAT
6. Collection on honeypots
passive
tcp/ip hijacking
HIDS
honeynet
7. Dynamic / private ports
49 -152 - 65 -535
application
honeypot
split horizon DNS
8. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
spoofing attacks
firewall architectures
stateful inspection
coaxial
9. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
1024 - 49 -151
broadcast domain
DMZ
ARP
10. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
coaxial
screened host
honeypot
fraggle
11. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
DMZ
application gateway
defense in depth
hub
12. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
passive
null session
encrypt session key
screened host
13. IDS that relies on the identification of known attack signatures
bastion host
knowledge based
zone transfer
replay
14. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
0 - 1023
NIDS network connections
active
IP spoofing
15. Protocol used to map an known IP address to its corresponding media access control (MAC) address
10Base5
10base2
switch
ARP
16. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
0 - 1023
static NAT
session hijacking
network
17. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
proxy server
repeater
coaxial
DoS attacks
18. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
VLAN
replay
ARP poisoning
IP spoofing
19. An application layer gateway works at this layer of the OSI model
SYN flood
application
stateful inspection
smurf
20. A complete transfer of all DNS zone information from one server to another
man in the middle and replay
zone transfer
hub
ping flooding
21. Amplifies the signal of incoming packets before broadcasting them to the network
DNS spoofing
IP spoofing
repeater
dynamic NAT
22. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
port address translation
NAT
dual homed
fiber optic
23. One private IP address is mapped to one public IP address
static NAT
VLAN
NIDS
firewalls
24. Attempt to block service or reduce activity by overloading the victim machine with ping requests
subnet
ping flooding
port address translation
dynamic NAT
25. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
NIPS
DNS spoofing
man in the middle and replay
port address translation
26. Used to pass data from one VLAN to another
passive
router
smurf
dual homed
27. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
website spoofing
private
screened subnet
10Base5
28. Evolved from IDS - monitors network traffic - detects and responds to attack on network
null session
blind
DNS spoofing
NIPS
29. An attacker redirects traffic by falsifying the IP address requested by ARP request
ARP poisoning
protocol analyzer
encrypt session key
VLAN
30. Session hijacking countermeasure
knowledge based
active
encrypt session key
cat3
31. Known as thicknet - 10mbps - limited to 500 meters
land attack
repeater
website spoofing
10Base5
32. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
application gateway
website spoofing
DMZ
ping of death
33. Firewall with several NICs connected to different networks
multi homed
deny by default
replay
active
34. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
NAT
null session
firewall architectures
broadcast domain
35. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
smurf
passive
NIDS network connections
VLAN
36. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
packet filter
router
DMZ
informed
37. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
informed
multiple interface firewall
IP spoofing
tcp/ip hijacking
38. Connects devices together to form a subnet - broadcasts incoming packets to all devices
coaxial
application
1024 - 49 -151
hub
39. A packet filtering firewall works at this layer of the OSI model
man in the middle and replay
extranet
network
protocol
40. User / registered ports
subnet
packet filter
1024 - 49 -151
behavior based
41. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
NIPS
ARP
tcp/ip hijacking
split horizon DNS
42. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
promiscuous
defense in depth
dual homed
49 -152 - 65 -535
43. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
session hijacking
active
behavior based
passive
44. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
stateful inspection
repeater
tcp/ip hijacking
land attack
45. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
bastion host
ping of death
replay
informed
46. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
stateful inspection
packet filter
NIPS
proxy
47. A pool of public IP addresses is shared by a collection of private IP addresses
dynamic NAT
risk mitigation
passive
application
48. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
IP spoofing
network
website spoofing
proxy
49. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
1024 - 49 -151
subnet
screened host
active
50. Known as thinnet - 10mbps - limited to 185 meters
false negative
hub
10base2
screened subnet