SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Monitors network traffic to identify possible attacks
promiscuous
application
PBX (Private Branch Exchange)
NIDS
2. IDS that relies on the identification of known attack signatures
NIDS
packet filter
knowledge based
49 -152 - 65 -535
3. Known as thinnet - 10mbps - limited to 185 meters
10base2
application
passive
spoofing
4. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
knowledge based
split horizon DNS
screened host
port address translation
5. Examines a entire packet and determines action based on a complex set of rules
blind
application gateway
fraggle
teardrop
6. Malicious activity not reported or detected
stateful inspection
false negative
honeypot
content filter
7. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
store and forward
application
NIDS network connections
ping of death
8. One private IP address is mapped to one public IP address
behavior based
informed
website spoofing
static NAT
9. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
firewall architectures
port address translation
passive
repeater
10. Amplifies the signal of incoming packets before broadcasting them to the network
49 -152 - 65 -535
broadcast domain
NIDS
repeater
11. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
man in the middle and replay
spoofing attacks
NIDS
teardrop
12. IP - email - website - DNS - and ARP
HIDS
IP spoofing
spoofing attacks
honeynet
13. Network configuration that permits selected outsiders access internal information systems
screened subnet
firewall architectures
extranet
layered
14. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
cat3
man in the middle
promiscuous
port
15. A set of rules computers use to communicate with each other across a network
NIDS
null session
network
protocol
16. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
hub
switch
twisted pair
promiscuous
17. An attacker redirects traffic by falsifying the IP address requested by ARP request
website spoofing
spoofing attacks
ARP poisoning
honeynet
18. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
risk mitigation
null session
defense in depth
ping flooding
19. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
IP spoofing
passive
extranet
0 - 1023
20. Collection on honeypots
0 - 1023
passive
honeynet
active
21. IPS response method - terminate process/session - block/reject and redirect network traffic
active
switch
promiscuous
firewalls
22. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
website spoofing
port address translation
ping of death
bastion host
23. Bbenign activity reported as malicious
false positive
repeater
port
broadcast domain
24. Dynamic / private ports
packet filter
risk mitigation
49 -152 - 65 -535
static NAT
25. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
NIPS
switch
smurf
stateful inspection
26. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
SYN flood
website spoofing
NIDS
spoofing attacks
27. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
fraggle
hub
man in the middle
28. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
bastion host
passive
packet filter
network
29. Twisted pair cable with speed capability of 1Gbps
PBX (Private Branch Exchange)
cat5
spoofing attacks
49 -152 - 65 -535
30. Known as thicknet - 10mbps - limited to 500 meters
IP spoofing
proxy
10Base5
behavior based
31. Connects devices together to form a subnet - broadcasts incoming packets to all devices
hub
honeypot
repeater
router
32. A server that sits between an intranet and it's Internet connection - masking all IP addresses
store and forward
network
proxy server
0 - 1023
33. IDS response method using logging and notification
informed
passive
null session
website spoofing
34. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
store and forward
router
IP spoofing
broadcast domain
35. Allows all traffic except traffic that is specifically denied - also known as permissive access
passive
allow by default
replay
smurf
36. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
repeater
coaxial
ARP
10base2
37. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
proxy
spoofing
behavior based
IP spoofing
38. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
ARP poisoning
stateful inspection
content filter
DNS spoofing
39. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
spoofing
stateful inspection
protocol analyzer
deny by default
40. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
null session
firewall architectures
protocol analyzer
stateful inspection
41. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
fiber optic
10base2
dynamic NAT
layered
42. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
website spoofing
subnet
switch
session hijacking
43. Evolved from IDS - monitors network traffic - detects and responds to attack on network
port address translation
NIPS
SYN flood
multiple interface firewall
44. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
NIPS
0 - 1023
port
coaxial
45. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
honeynet
PBX (Private Branch Exchange)
private
knowledge based
46. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
false negative
active
port
DMZ
47. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
coaxial
stateful inspection
repeater
teardrop
48. Man in the middle attack where the content of an intercepted message is altered before it is sent on
replay
active
dual homed
repeater
49. A pool of public IP addresses is shared by a collection of private IP addresses
cat3
screened host
smurf
dynamic NAT
50. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
1024 - 49 -151
packet filter
proxy
IP spoofing