SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One private IP address is mapped to one public IP address
protocol
coaxial
static NAT
proxy
2. A pool of public IP addresses is shared by a collection of private IP addresses
man in the middle
static NAT
dynamic NAT
risk mitigation
3. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
cat3
firewalls
active
private
4. Known as thicknet - 10mbps - limited to 500 meters
ARP poisoning
source - destination - protocol
10Base5
router
5. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
49 -152 - 65 -535
store and forward
port address translation
DMZ
6. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
layered
land attack
replay
split horizon DNS
7. Collection on honeypots
replay
honeynet
proxy
ping flooding
8. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
static NAT
null session
extranet
firewall architectures
9. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
passive
router
tcp/ip hijacking
49 -152 - 65 -535
10. Bbenign activity reported as malicious
dual homed
DoS attacks
false positive
tcp/ip hijacking
11. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
session hijacking
subnet
ARP
protocol analyzer
12. Attempt to block service or reduce activity by overloading the victim machine with ping requests
49 -152 - 65 -535
port
ping flooding
spoofing attacks
13. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
static NAT
content filter
store and forward
NIPS
14. Known as thinnet - 10mbps - limited to 185 meters
ping of death
10base2
behavior based
dynamic NAT
15. User / registered ports
NIDS network connections
49 -152 - 65 -535
informed
1024 - 49 -151
16. Malicious activity not reported or detected
active
false negative
cat3
SYN flood
17. IP spoofing attack where the attacker can only send packets and has to guess about replies
knowledge based
honeypot
risk mitigation
blind
18. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
1024 - 49 -151
knowledge based
VLAN
static NAT
19. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
SYN flood
application gateway
smurf
dual homed
20. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
DMZ
NIDS network connections
informed
dual homed
21. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
session hijacking
firewall architectures
honeypot
NIDS
22. Twisted pair cable with speed capability of 1Gbps
cat5
HIDS
passive
false negative
23. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
split horizon DNS
router
false negative
NIDS network connections
24. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
subnet
bastion host
fiber optic
tcp/ip hijacking
25. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
bastion host
spoofing attacks
DMZ
IP spoofing
26. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
screened subnet
stateful inspection
multiple interface firewall
store and forward
27. Twisted pair cable with speed capability of 10Mbps
risk mitigation
private
cat3
tcp/ip hijacking
28. Firewall with several NICs connected to different networks
multi homed
proxy
DNS spoofing
IP spoofing
29. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
passive
null session
fiber optic
passive
30. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
DoS attacks
protocol
risk mitigation
private
31. IP - email - website - DNS - and ARP
spoofing attacks
honeypot
NIDS
twisted pair
32. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
router
null session
packet filter
IP spoofing
33. A server that sits between an intranet and it's Internet connection - masking all IP addresses
informed
active
proxy server
spoofing
34. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
active
man in the middle and replay
network
IP spoofing
35. A logical connection point allowing computers and software to communicate and exchange data
screened subnet
session hijacking
port
behavior based
36. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
screened subnet
1024 - 49 -151
router
10Base5
37. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
knowledge based
honeypot
informed
49 -152 - 65 -535
38. Forging an IP address with the address of a trusted host
IP spoofing
man in the middle and replay
proxy server
man in the middle
39. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
SYN flood
NAT
multi homed
cat3
40. A packet filtering firewall works at this layer of the OSI model
DoS attacks
informed
screened subnet
network
41. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
extranet
IP spoofing
allow by default
smurf
42. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
proxy server
ping flooding
defense in depth
split horizon DNS
43. Monitors network traffic to identify possible attacks
passive
firewalls
NIDS
protocol analyzer
44. Acts as an organizations internal phone system
49 -152 - 65 -535
screened host
false positive
PBX (Private Branch Exchange)
45. IDS response method using logging and notification
passive
packet filter
fiber optic
twisted pair
46. Level 2 firewall often used to filter web traffic
dual homed
spoofing attacks
tcp/ip hijacking
proxy
47. Evolved from IDS - monitors network traffic - detects and responds to attack on network
subnet
allow by default
ping flooding
NIPS
48. Examines a entire packet and determines action based on a complex set of rules
DNS spoofing
stateful inspection
application gateway
port address translation
49. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
application
proxy
ping of death
replay
50. Allows all traffic except traffic that is specifically denied - also known as permissive access
subnet
allow by default
dual homed
twisted pair
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests