SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IDS that relies on the identification of known attack signatures
extranet
honeynet
knowledge based
subnet
2. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
router
1024 - 49 -151
honeypot
smurf
3. Connects devices together to form a subnet - broadcasts incoming packets to all devices
encrypt session key
hub
honeynet
passive
4. A server that sits between an intranet and it's Internet connection - masking all IP addresses
firewall architectures
proxy server
informed
NIDS
5. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
zone transfer
49 -152 - 65 -535
risk mitigation
NIDS
6. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
subnet
promiscuous
HIDS
NAT
7. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
switch
land attack
HIDS
stateful inspection
8. Bbenign activity reported as malicious
twisted pair
active
false positive
DoS attacks
9. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
teardrop
cat3
behavior based
10. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
spoofing
10base2
private
PBX (Private Branch Exchange)
11. IP - email - website - DNS - and ARP
man in the middle
hub
firewalls
spoofing attacks
12. Protocol used to map an known IP address to its corresponding media access control (MAC) address
ping of death
spoofing
ARP poisoning
ARP
13. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
firewall architectures
null session
bastion host
twisted pair
14. A sniffer mode used to capture traffic addressed to/from another machine on the network
promiscuous
replay
null session
application gateway
15. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
store and forward
proxy
null session
NAT
16. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
multiple interface firewall
router
false negative
land attack
17. Network configuration that permits selected outsiders access internal information systems
repeater
NIDS
extranet
NIPS
18. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
session hijacking
0 - 1023
spoofing attacks
firewalls
19. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
smurf
screened host
dual homed
NIDS
20. Packet filtering - proxies - stateful inspection
firewalls
proxy
deny by default
hub
21. Known as thicknet - 10mbps - limited to 500 meters
cat3
firewalls
coaxial
10Base5
22. Firewall with several NICs connected to different networks
screened subnet
multi homed
passive
knowledge based
23. Collection on honeypots
10Base5
allow by default
honeynet
twisted pair
24. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
ping of death
null session
DNS spoofing
spoofing attacks
25. IP spoofing attack where the attacker can only send packets and has to guess about replies
firewalls
blind
bastion host
SYN flood
26. Allows all traffic except traffic that is specifically denied - also known as permissive access
allow by default
DMZ
source - destination - protocol
router
27. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
stateful inspection
land attack
port address translation
multi homed
28. Examines a entire packet and determines action based on a complex set of rules
HIDS
port address translation
application gateway
VLAN
29. Twisted pair cable with speed capability of 10Mbps
ping of death
firewalls
firewalls
cat3
30. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
passive
NIPS
HIDS
blind
31. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
SYN flood
firewalls
passive
twisted pair
32. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
packet filter
source - destination - protocol
router
IP spoofing
33. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
NIDS network connections
twisted pair
honeypot
subnet
34. An application layer gateway works at this layer of the OSI model
protocol
active
protocol analyzer
application
35. Head of a packet contains...
source - destination - protocol
stateful inspection
49 -152 - 65 -535
DMZ
36. Man in the middle attack where the content of an intercepted message is altered before it is sent on
extranet
network
10Base5
active
37. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
passive
DNS spoofing
application gateway
ping of death
38. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
fiber optic
subnet
firewalls
man in the middle
39. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
1024 - 49 -151
DoS attacks
NIPS
tcp/ip hijacking
40. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
extranet
coaxial
active
IP spoofing
41. Attempt to block service or reduce activity by overloading the victim machine with ping requests
passive
ping flooding
twisted pair
defense in depth
42. One private IP address is mapped to one public IP address
static NAT
VLAN
port address translation
null session
43. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
man in the middle and replay
active
twisted pair
proxy
44. Level 2 firewall often used to filter web traffic
ARP poisoning
proxy
knowledge based
encrypt session key
45. Malicious activity not reported or detected
subnet
informed
false negative
honeypot
46. Known as thinnet - 10mbps - limited to 185 meters
fraggle
10base2
cat5
stateful inspection
47. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
SYN flood
honeynet
NAT
passive
48. Acts as an organizations internal phone system
dual homed
honeypot
PBX (Private Branch Exchange)
broadcast domain
49. A variation of a smurf attack using UDP
IP spoofing
coaxial
proxy server
fraggle
50. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
null session
IP spoofing
false positive
SYN flood