SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol used to map an known IP address to its corresponding media access control (MAC) address
website spoofing
NIDS
firewalls
ARP
2. Malicious activity not reported or detected
defense in depth
false negative
layered
stateful inspection
3. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
smurf
teardrop
firewalls
deny by default
4. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
man in the middle
10Base5
spoofing
fiber optic
5. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
HIDS
passive
store and forward
multi homed
6. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
smurf
SYN flood
promiscuous
defense in depth
7. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
teardrop
null session
knowledge based
static NAT
8. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
smurf
repeater
man in the middle
49 -152 - 65 -535
9. Known as thinnet - 10mbps - limited to 185 meters
10base2
packet filter
tcp/ip hijacking
store and forward
10. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
tcp/ip hijacking
source - destination - protocol
smurf
dynamic NAT
11. Connects devices together to form a subnet - broadcasts incoming packets to all devices
application gateway
hub
screened host
firewalls
12. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
multi homed
store and forward
proxy server
NIDS
13. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
screened subnet
ping of death
SYN flood
tcp/ip hijacking
14. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
HIDS
informed
null session
deny by default
15. Bbenign activity reported as malicious
VLAN
10Base5
false positive
SYN flood
16. Examines a entire packet and determines action based on a complex set of rules
informed
switch
10Base5
application gateway
17. A sniffer mode used to capture traffic addressed to/from another machine on the network
firewall architectures
switch
stateful inspection
promiscuous
18. Head of a packet contains...
layered
packet filter
source - destination - protocol
website spoofing
19. IDS response method using logging and notification
1024 - 49 -151
land attack
passive
ping flooding
20. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
coaxial
screened subnet
NAT
21. A server that sits between an intranet and it's Internet connection - masking all IP addresses
router
proxy server
network
cat3
22. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
port address translation
ping of death
HIDS
firewalls
23. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
ping of death
honeypot
router
VLAN
24. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
NIDS
NIDS network connections
man in the middle and replay
active
25. A logical connection point allowing computers and software to communicate and exchange data
subnet
cat3
port
extranet
26. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
session hijacking
NIDS
informed
packet filter
27. Session hijacking countermeasure
stateful inspection
encrypt session key
spoofing attacks
0 - 1023
28. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
man in the middle
smurf
content filter
layered
29. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
proxy
informed
split horizon DNS
honeynet
30. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
NIDS
man in the middle and replay
active
DMZ
31. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
false positive
bastion host
DMZ
port
32. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
NIDS
ping of death
honeynet
33. Firewall with several NICs connected to different networks
multi homed
stateful inspection
DMZ
split horizon DNS
34. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
promiscuous
ARP
SYN flood
website spoofing
35. Evolved from IDS - monitors network traffic - detects and responds to attack on network
tcp/ip hijacking
active
NIPS
replay
36. Used to pass data from one VLAN to another
NIDS network connections
router
10base2
proxy
37. Attempt to block service or reduce activity by overloading the victim machine with ping requests
49 -152 - 65 -535
spoofing attacks
ping flooding
ARP poisoning
38. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
protocol
cat5
dynamic NAT
tcp/ip hijacking
39. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
PBX (Private Branch Exchange)
IP spoofing
zone transfer
VLAN
40. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
broadcast domain
screened host
content filter
10base2
41. Amplifies the signal of incoming packets before broadcasting them to the network
repeater
session hijacking
teardrop
replay
42. Network configuration that permits selected outsiders access internal information systems
knowledge based
tcp/ip hijacking
10base2
extranet
43. Twisted pair cable with speed capability of 1Gbps
firewalls
content filter
ping flooding
cat5
44. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
session hijacking
knowledge based
honeynet
dual homed
45. An application layer gateway works at this layer of the OSI model
zone transfer
application
VLAN
defense in depth
46. A complete transfer of all DNS zone information from one server to another
switch
firewalls
deny by default
zone transfer
47. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
application
honeynet
man in the middle
risk mitigation
48. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
broadcast domain
NIPS
49 -152 - 65 -535
protocol analyzer
49. Level 2 firewall often used to filter web traffic
cat5
dual homed
twisted pair
proxy
50. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
application
risk mitigation
subnet
zone transfer