SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
screened host
router
VLAN
ping flooding
2. Monitors network traffic to identify possible attacks
proxy
NAT
NIDS
passive
3. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
false negative
screened subnet
port
fiber optic
4. Malicious activity not reported or detected
false negative
IP spoofing
store and forward
null session
5. Allows all traffic except traffic that is specifically denied - also known as permissive access
proxy
IP spoofing
spoofing
allow by default
6. Evolved from IDS - monitors network traffic - detects and responds to attack on network
man in the middle and replay
proxy server
ping of death
NIPS
7. Twisted pair cable with speed capability of 10Mbps
cat3
cat5
man in the middle and replay
extranet
8. User / registered ports
null session
repeater
1024 - 49 -151
HIDS
9. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
DNS spoofing
twisted pair
content filter
NAT
10. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
10Base5
NAT
10base2
port
11. Dynamic / private ports
fraggle
firewalls
defense in depth
49 -152 - 65 -535
12. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
allow by default
split horizon DNS
tcp/ip hijacking
proxy server
13. IDS response method using logging and notification
risk mitigation
passive
DoS attacks
allow by default
14. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
extranet
IP spoofing
proxy server
router
15. Connects devices together to form a subnet - broadcasts incoming packets to all devices
SYN flood
hub
screened host
dual homed
16. A complete transfer of all DNS zone information from one server to another
risk mitigation
replay
private
zone transfer
17. A set of rules computers use to communicate with each other across a network
protocol
proxy
teardrop
extranet
18. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
49 -152 - 65 -535
informed
active
honeypot
19. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
man in the middle
screened host
bastion host
behavior based
20. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
informed
dual homed
fiber optic
hub
21. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
layered
allow by default
man in the middle
dual homed
22. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
proxy
DoS attacks
teardrop
PBX (Private Branch Exchange)
23. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
false positive
HIDS
private
website spoofing
24. Packet filtering - proxies - stateful inspection
stateful inspection
firewalls
NIDS
PBX (Private Branch Exchange)
25. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
spoofing attacks
teardrop
HIDS
proxy server
26. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
firewalls
bastion host
passive
proxy
27. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
null session
layered
router
deny by default
28. IDS that relies on the identification of known attack signatures
DoS attacks
0 - 1023
land attack
knowledge based
29. Used to pass data from one VLAN to another
SYN flood
network
blind
router
30. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
broadcast domain
ping of death
router
smurf
31. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
NIDS
smurf
IP spoofing
ping of death
32. Examines a entire packet and determines action based on a complex set of rules
application gateway
NIDS
application
IP spoofing
33. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
allow by default
stateful inspection
defense in depth
land attack
34. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
informed
active
multiple interface firewall
honeypot
35. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
source - destination - protocol
deny by default
DoS attacks
null session
36. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
NIDS
honeypot
land attack
application
37. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
ARP poisoning
coaxial
spoofing attacks
allow by default
38. Known as thinnet - 10mbps - limited to 185 meters
proxy
NIPS
10base2
IP spoofing
39. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
risk mitigation
bastion host
10base2
encrypt session key
40. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
behavior based
allow by default
session hijacking
firewalls
41. Forging an IP address with the address of a trusted host
passive
multi homed
IP spoofing
man in the middle and replay
42. Attempt to block service or reduce activity by overloading the victim machine with ping requests
false negative
cat3
zone transfer
ping flooding
43. Network configuration that permits selected outsiders access internal information systems
DMZ
extranet
NIDS network connections
bastion host
44. A server that sits between an intranet and it's Internet connection - masking all IP addresses
protocol
twisted pair
proxy server
SYN flood
45. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
NIDS
website spoofing
stateful inspection
proxy
46. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
coaxial
protocol analyzer
split horizon DNS
multiple interface firewall
47. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
active
defense in depth
stateful inspection
passive
48. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
honeypot
0 - 1023
promiscuous
ARP poisoning
49. Level 2 firewall often used to filter web traffic
cat3
active
coaxial
proxy
50. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
coaxial
encrypt session key
proxy
split horizon DNS