SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A packet filtering firewall works at this layer of the OSI model
NIDS network connections
protocol
screened host
network
2. Known as thinnet - 10mbps - limited to 185 meters
10base2
risk mitigation
application
defense in depth
3. Level 2 firewall often used to filter web traffic
network
0 - 1023
static NAT
proxy
4. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
port
VLAN
protocol
10base2
5. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
null session
encrypt session key
informed
man in the middle
6. Bbenign activity reported as malicious
false positive
ping flooding
10Base5
DoS attacks
7. IPS response method - terminate process/session - block/reject and redirect network traffic
IP spoofing
NAT
proxy
active
8. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
behavior based
knowledge based
1024 - 49 -151
protocol analyzer
9. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
stateful inspection
private
deny by default
ping of death
10. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
fraggle
honeynet
NAT
proxy server
11. User / registered ports
router
protocol
protocol analyzer
1024 - 49 -151
12. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
port
null session
screened subnet
honeypot
13. Examines a entire packet and determines action based on a complex set of rules
IP spoofing
application gateway
repeater
router
14. Monitors network traffic to identify possible attacks
null session
1024 - 49 -151
null session
NIDS
15. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
application gateway
firewalls
passive
NAT
16. Man in the middle attack where the content of an intercepted message is altered before it is sent on
repeater
risk mitigation
NIDS
active
17. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
port address translation
IP spoofing
encrypt session key
allow by default
18. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
network
NIDS
repeater
store and forward
19. Allows all traffic except traffic that is specifically denied - also known as permissive access
IP spoofing
land attack
allow by default
honeypot
20. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
ping of death
hub
ARP
informed
21. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
honeypot
defense in depth
subnet
encrypt session key
22. Packet filtering - proxies - stateful inspection
firewalls
replay
session hijacking
VLAN
23. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
multiple interface firewall
HIDS
replay
NIDS network connections
24. Amplifies the signal of incoming packets before broadcasting them to the network
repeater
layered
network
null session
25. Known as thicknet - 10mbps - limited to 500 meters
10Base5
hub
static NAT
dual homed
26. Dynamic / private ports
smurf
49 -152 - 65 -535
HIDS
protocol analyzer
27. Attempt to block service or reduce activity by overloading the victim machine with ping requests
packet filter
ping flooding
twisted pair
screened host
28. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
IP spoofing
teardrop
10Base5
extranet
29. Twisted pair cable with speed capability of 10Mbps
promiscuous
source - destination - protocol
cat3
10base2
30. A server that sits between an intranet and it's Internet connection - masking all IP addresses
proxy server
layered
zone transfer
PBX (Private Branch Exchange)
31. Firewall with several NICs connected to different networks
DoS attacks
risk mitigation
multi homed
coaxial
32. A logical connection point allowing computers and software to communicate and exchange data
screened host
port
stateful inspection
null session
33. Twisted pair cable with speed capability of 1Gbps
cat5
NAT
application gateway
defense in depth
34. Evolved from IDS - monitors network traffic - detects and responds to attack on network
honeypot
HIDS
NIPS
spoofing
35. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
DNS spoofing
static NAT
knowledge based
screened subnet
36. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
dynamic NAT
tcp/ip hijacking
private
risk mitigation
37. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
broadcast domain
NIPS
SYN flood
promiscuous
38. A variation of a smurf attack using UDP
fraggle
protocol
firewalls
replay
39. Forging an IP address with the address of a trusted host
repeater
IP spoofing
honeynet
stateful inspection
40. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
land attack
broadcast domain
0 - 1023
man in the middle and replay
41. IP spoofing attack where the attacker can only send packets and has to guess about replies
blind
bastion host
defense in depth
spoofing
42. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
smurf
application
switch
ARP poisoning
43. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
0 - 1023
ARP
proxy
NIDS network connections
44. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
DNS spoofing
bastion host
switch
replay
45. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
replay
behavior based
cat5
coaxial
46. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
spoofing attacks
firewalls
PBX (Private Branch Exchange)
twisted pair
47. A sniffer mode used to capture traffic addressed to/from another machine on the network
promiscuous
ARP poisoning
DoS attacks
website spoofing
48. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
proxy
application gateway
NIDS network connections
10base2
49. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
DNS spoofing
multiple interface firewall
SYN flood
router
50. IP - email - website - DNS - and ARP
spoofing attacks
cat5
source - destination - protocol
informed