SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Monitors network traffic to identify possible attacks
NIDS
NAT
land attack
bastion host
2. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
IP spoofing
NIDS
application
SYN flood
3. A sniffer mode used to capture traffic addressed to/from another machine on the network
ARP poisoning
twisted pair
NAT
promiscuous
4. Twisted pair cable with speed capability of 1Gbps
cat5
smurf
behavior based
firewalls
5. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
passive
proxy
repeater
promiscuous
6. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
risk mitigation
firewalls
network
tcp/ip hijacking
7. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
behavior based
NIDS
cat3
spoofing
8. User / registered ports
1024 - 49 -151
IP spoofing
active
DMZ
9. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
ARP
VLAN
firewall architectures
port
10. Malicious activity not reported or detected
firewalls
false negative
subnet
passive
11. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
website spoofing
NIDS
router
smurf
12. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
DoS attacks
hub
session hijacking
fraggle
13. A pool of public IP addresses is shared by a collection of private IP addresses
website spoofing
application gateway
stateful inspection
dynamic NAT
14. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
honeypot
man in the middle and replay
store and forward
dual homed
15. A variation of a smurf attack using UDP
fraggle
honeynet
false positive
firewalls
16. Network configuration that permits selected outsiders access internal information systems
extranet
broadcast domain
active
man in the middle
17. Bbenign activity reported as malicious
IP spoofing
dynamic NAT
false positive
stateful inspection
18. Packet filtering - proxies - stateful inspection
DMZ
encrypt session key
DoS attacks
firewalls
19. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
website spoofing
honeynet
ping of death
NIDS
20. An application layer gateway works at this layer of the OSI model
DMZ
twisted pair
application
passive
21. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
defense in depth
land attack
VLAN
ping flooding
22. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
NAT
private
extranet
active
23. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
repeater
subnet
spoofing attacks
man in the middle and replay
24. A server that sits between an intranet and it's Internet connection - masking all IP addresses
risk mitigation
NAT
static NAT
proxy server
25. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
protocol analyzer
screened host
stateful inspection
DMZ
26. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
man in the middle and replay
source - destination - protocol
knowledge based
website spoofing
27. A packet filtering firewall works at this layer of the OSI model
static NAT
false negative
firewall architectures
network
28. IDS response method using logging and notification
behavior based
passive
subnet
risk mitigation
29. Acts as an organizations internal phone system
stateful inspection
port
land attack
PBX (Private Branch Exchange)
30. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
null session
promiscuous
defense in depth
deny by default
31. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
store and forward
informed
null session
private
32. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
teardrop
NIPS
DNS spoofing
website spoofing
33. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
screened subnet
port address translation
stateful inspection
defense in depth
34. Attempt to block service or reduce activity by overloading the victim machine with ping requests
IP spoofing
proxy
ping flooding
knowledge based
35. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
VLAN
man in the middle and replay
content filter
10Base5
36. Used to pass data from one VLAN to another
proxy
router
promiscuous
null session
37. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
SYN flood
informed
store and forward
1024 - 49 -151
38. Amplifies the signal of incoming packets before broadcasting them to the network
repeater
NIDS network connections
firewall architectures
false negative
39. Forging an IP address with the address of a trusted host
IP spoofing
stateful inspection
man in the middle and replay
risk mitigation
40. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
router
proxy server
DNS spoofing
PBX (Private Branch Exchange)
41. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
store and forward
application gateway
layered
multiple interface firewall
42. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
ping of death
application gateway
screened subnet
NIDS
43. Known as thicknet - 10mbps - limited to 500 meters
informed
10Base5
false negative
IP spoofing
44. Twisted pair cable with speed capability of 10Mbps
subnet
repeater
application gateway
cat3
45. Known as thinnet - 10mbps - limited to 185 meters
content filter
10base2
IP spoofing
proxy
46. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
defense in depth
informed
zone transfer
broadcast domain
47. A set of rules computers use to communicate with each other across a network
IP spoofing
PBX (Private Branch Exchange)
honeypot
protocol
48. Level 2 firewall often used to filter web traffic
NIDS network connections
zone transfer
proxy
promiscuous
49. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
switch
DNS spoofing
proxy
packet filter
50. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
layered
store and forward
passive
false positive