SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Known as thinnet - 10mbps - limited to 185 meters
10base2
bastion host
DMZ
active
2. Malicious activity not reported or detected
false negative
deny by default
teardrop
switch
3. Examines a entire packet and determines action based on a complex set of rules
teardrop
application gateway
extranet
multiple interface firewall
4. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
NIDS network connections
screened host
spoofing
protocol
5. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
router
protocol
broadcast domain
passive
6. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
application gateway
man in the middle and replay
application
passive
7. An attacker redirects traffic by falsifying the IP address requested by ARP request
firewall architectures
NIPS
ARP poisoning
cat5
8. IDS response method using logging and notification
passive
null session
proxy
network
9. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
49 -152 - 65 -535
fraggle
ARP
store and forward
10. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
tcp/ip hijacking
protocol analyzer
man in the middle
ping of death
11. Evolved from IDS - monitors network traffic - detects and responds to attack on network
10Base5
replay
stateful inspection
NIPS
12. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
port address translation
null session
PBX (Private Branch Exchange)
application
13. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
NIDS
proxy server
bastion host
layered
14. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
honeypot
teardrop
informed
coaxial
15. Monitors network traffic to identify possible attacks
twisted pair
switch
NIDS
replay
16. Packet filtering - proxies - stateful inspection
active
cat5
repeater
firewalls
17. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
risk mitigation
IP spoofing
allow by default
18. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
active
man in the middle
teardrop
store and forward
19. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
proxy server
website spoofing
repeater
smurf
20. IP - email - website - DNS - and ARP
packet filter
spoofing attacks
active
IP spoofing
21. Collection on honeypots
store and forward
honeynet
honeypot
DNS spoofing
22. Forging an IP address with the address of a trusted host
fraggle
proxy server
IP spoofing
replay
23. Protocol used to map an known IP address to its corresponding media access control (MAC) address
ping flooding
knowledge based
ARP
fiber optic
24. One private IP address is mapped to one public IP address
DoS attacks
DMZ
DNS spoofing
static NAT
25. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
firewall architectures
ping flooding
port address translation
NIDS
26. IDS that relies on the identification of known attack signatures
behavior based
knowledge based
honeypot
subnet
27. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
protocol analyzer
PBX (Private Branch Exchange)
screened host
VLAN
28. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
switch
layered
IP spoofing
active
29. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
layered
proxy server
null session
protocol
30. Attempt to block service or reduce activity by overloading the victim machine with ping requests
spoofing
ping flooding
repeater
DMZ
31. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
NIDS
null session
land attack
smurf
32. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
static NAT
coaxial
risk mitigation
spoofing
33. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
NAT
dual homed
knowledge based
broadcast domain
34. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
passive
screened subnet
ARP poisoning
10base2
35. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
10base2
DNS spoofing
multiple interface firewall
website spoofing
36. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
null session
land attack
stateful inspection
layered
37. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
layered
active
DMZ
smurf
38. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
honeynet
HIDS
NIDS network connections
twisted pair
39. Dynamic / private ports
static NAT
stateful inspection
firewalls
49 -152 - 65 -535
40. IPS response method - terminate process/session - block/reject and redirect network traffic
packet filter
active
dual homed
honeynet
41. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
null session
screened host
subnet
zone transfer
42. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
content filter
behavior based
static NAT
screened host
43. A pool of public IP addresses is shared by a collection of private IP addresses
IP spoofing
dynamic NAT
switch
application gateway
44. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
broadcast domain
spoofing
0 - 1023
subnet
45. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
twisted pair
bastion host
screened subnet
screened host
46. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
protocol
screened subnet
layered
replay
47. A variation of a smurf attack using UDP
session hijacking
subnet
null session
fraggle
48. Used to pass data from one VLAN to another
screened host
router
IP spoofing
teardrop
49. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
multi homed
man in the middle and replay
stateful inspection
firewall architectures
50. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
twisted pair
1024 - 49 -151
null session
teardrop