SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
10Base5
hub
land attack
application
2. Twisted pair cable with speed capability of 1Gbps
port address translation
repeater
cat5
VLAN
3. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
private
false negative
fraggle
multiple interface firewall
4. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
cat5
router
screened host
active
5. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
firewalls
packet filter
IP spoofing
6. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
null session
passive
split horizon DNS
deny by default
7. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
firewalls
encrypt session key
DMZ
DNS spoofing
8. A set of rules computers use to communicate with each other across a network
active
man in the middle and replay
passive
protocol
9. Head of a packet contains...
website spoofing
passive
source - destination - protocol
twisted pair
10. Collection on honeypots
honeynet
firewall architectures
port
man in the middle
11. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
ARP poisoning
false negative
NAT
0 - 1023
12. Forging an IP address with the address of a trusted host
layered
DNS spoofing
IP spoofing
spoofing attacks
13. Dynamic / private ports
49 -152 - 65 -535
passive
PBX (Private Branch Exchange)
bastion host
14. A complete transfer of all DNS zone information from one server to another
zone transfer
honeynet
coaxial
twisted pair
15. A pool of public IP addresses is shared by a collection of private IP addresses
man in the middle and replay
null session
dynamic NAT
router
16. Firewall with several NICs connected to different networks
IP spoofing
multi homed
private
49 -152 - 65 -535
17. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
dual homed
replay
NAT
port address translation
18. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
DMZ
proxy
active
firewalls
19. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
cat5
0 - 1023
fraggle
content filter
20. Session hijacking countermeasure
protocol
smurf
IP spoofing
encrypt session key
21. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
store and forward
session hijacking
twisted pair
defense in depth
22. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
twisted pair
stateful inspection
repeater
active
23. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
blind
proxy server
broadcast domain
session hijacking
24. A logical connection point allowing computers and software to communicate and exchange data
port
network
firewall architectures
repeater
25. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
smurf
active
risk mitigation
firewall architectures
26. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
multiple interface firewall
ping of death
content filter
NIDS
27. Network configuration that permits selected outsiders access internal information systems
bastion host
ARP poisoning
DNS spoofing
extranet
28. IP spoofing attack where the attacker can only send packets and has to guess about replies
blind
replay
broadcast domain
port
29. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
IP spoofing
proxy
source - destination - protocol
30. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
dynamic NAT
ARP poisoning
switch
private
31. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
NIPS
encrypt session key
router
10base2
32. Monitors network traffic to identify possible attacks
land attack
NIDS
HIDS
switch
33. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
multiple interface firewall
dynamic NAT
honeypot
protocol analyzer
34. User / registered ports
multi homed
proxy
layered
1024 - 49 -151
35. Packet filtering - proxies - stateful inspection
null session
repeater
1024 - 49 -151
firewalls
36. An attacker redirects traffic by falsifying the IP address requested by ARP request
null session
10base2
fraggle
ARP poisoning
37. Twisted pair cable with speed capability of 10Mbps
cat3
IP spoofing
dual homed
extranet
38. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
fiber optic
IP spoofing
null session
1024 - 49 -151
39. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
informed
smurf
behavior based
firewalls
40. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
ping of death
null session
NIDS network connections
spoofing
41. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
layered
coaxial
active
teardrop
42. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
man in the middle and replay
replay
NIDS
NIDS network connections
43. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
risk mitigation
subnet
passive
content filter
44. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
spoofing
fraggle
false negative
split horizon DNS
45. A variation of a smurf attack using UDP
replay
application gateway
fraggle
port address translation
46. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
firewall architectures
layered
encrypt session key
ping flooding
47. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
IP spoofing
SYN flood
network
port
48. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
cat3
subnet
layered
false negative
49. Connects devices together to form a subnet - broadcasts incoming packets to all devices
hub
proxy server
website spoofing
IP spoofing
50. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
risk mitigation
extranet
screened subnet
DNS spoofing