SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Firewall with several NICs connected to different networks
honeypot
SYN flood
multi homed
subnet
2. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
twisted pair
content filter
teardrop
port
3. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
static NAT
replay
HIDS
repeater
4. Protocol used to map an known IP address to its corresponding media access control (MAC) address
deny by default
ARP
land attack
firewalls
5. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
risk mitigation
coaxial
content filter
spoofing
6. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
firewall architectures
1024 - 49 -151
passive
active
7. Collection on honeypots
proxy
honeynet
private
cat5
8. Examines a entire packet and determines action based on a complex set of rules
ARP
application gateway
cat3
null session
9. IP spoofing attack where the attacker can only send packets and has to guess about replies
SYN flood
content filter
DoS attacks
blind
10. Bbenign activity reported as malicious
twisted pair
active
false positive
10base2
11. One private IP address is mapped to one public IP address
ARP poisoning
man in the middle and replay
static NAT
honeynet
12. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
10Base5
packet filter
behavior based
ARP
13. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
ping of death
subnet
DoS attacks
defense in depth
14. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
screened subnet
land attack
router
firewalls
15. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
10Base5
IP spoofing
ping of death
firewalls
16. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
stateful inspection
VLAN
active
deny by default
17. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
layered
split horizon DNS
defense in depth
port
18. Connects devices together to form a subnet - broadcasts incoming packets to all devices
hub
NAT
active
private
19. Used to pass data from one VLAN to another
store and forward
null session
dual homed
router
20. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
stateful inspection
49 -152 - 65 -535
false positive
passive
21. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
firewalls
stateful inspection
man in the middle and replay
blind
22. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
screened host
DMZ
application
man in the middle and replay
23. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
private
bastion host
proxy server
subnet
24. Acts as an organizations internal phone system
honeynet
cat5
PBX (Private Branch Exchange)
screened subnet
25. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
promiscuous
HIDS
protocol analyzer
26. Twisted pair cable with speed capability of 1Gbps
cat3
active
dual homed
cat5
27. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
spoofing attacks
NIDS
honeynet
man in the middle and replay
28. Allows all traffic except traffic that is specifically denied - also known as permissive access
0 - 1023
allow by default
multi homed
store and forward
29. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
firewall architectures
replay
blind
risk mitigation
30. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
repeater
DoS attacks
informed
teardrop
31. Twisted pair cable with speed capability of 10Mbps
cat3
deny by default
honeynet
informed
32. Head of a packet contains...
source - destination - protocol
zone transfer
ARP poisoning
spoofing attacks
33. A complete transfer of all DNS zone information from one server to another
zone transfer
SYN flood
repeater
packet filter
34. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
screened subnet
false negative
proxy
DoS attacks
35. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
null session
screened subnet
SYN flood
spoofing attacks
36. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
IP spoofing
man in the middle and replay
defense in depth
proxy
37. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
protocol
application
0 - 1023
NAT
38. User / registered ports
1024 - 49 -151
cat5
NIDS network connections
10base2
39. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
promiscuous
screened subnet
stateful inspection
40. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
0 - 1023
firewall architectures
broadcast domain
IP spoofing
41. Man in the middle attack where the content of an intercepted message is altered before it is sent on
active
honeynet
informed
proxy server
42. A variation of a smurf attack using UDP
fraggle
blind
website spoofing
static NAT
43. IP - email - website - DNS - and ARP
deny by default
proxy
spoofing attacks
screened host
44. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
cat3
ping of death
fiber optic
firewalls
45. Attempt to block service or reduce activity by overloading the victim machine with ping requests
behavior based
49 -152 - 65 -535
ping flooding
twisted pair
46. Network configuration that permits selected outsiders access internal information systems
extranet
broadcast domain
port
application gateway
47. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
tcp/ip hijacking
NIDS network connections
DMZ
allow by default
48. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
promiscuous
layered
bastion host
port address translation
49. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
screened host
split horizon DNS
passive
ping of death
50. A sniffer mode used to capture traffic addressed to/from another machine on the network
promiscuous
honeynet
screened host
firewalls