SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPS response method - terminate process/session - block/reject and redirect network traffic
active
0 - 1023
defense in depth
zone transfer
2. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
knowledge based
twisted pair
10base2
cat3
3. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
encrypt session key
false negative
multiple interface firewall
static NAT
4. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
10base2
NAT
switch
spoofing
5. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
spoofing attacks
firewall architectures
session hijacking
allow by default
6. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
informed
website spoofing
knowledge based
coaxial
7. A complete transfer of all DNS zone information from one server to another
1024 - 49 -151
stateful inspection
zone transfer
replay
8. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
subnet
fraggle
content filter
cat3
9. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
hub
land attack
passive
source - destination - protocol
10. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
NAT
fraggle
firewalls
tcp/ip hijacking
11. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
application
protocol
land attack
ping flooding
12. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
stateful inspection
defense in depth
port
firewall architectures
13. Level 2 firewall often used to filter web traffic
proxy
DoS attacks
private
application
14. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
man in the middle and replay
firewalls
risk mitigation
null session
15. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
defense in depth
NIDS network connections
firewall architectures
stateful inspection
16. A variation of a smurf attack using UDP
ping of death
false positive
deny by default
fraggle
17. Examines a entire packet and determines action based on a complex set of rules
honeypot
ping of death
proxy
application gateway
18. Evolved from IDS - monitors network traffic - detects and responds to attack on network
NIPS
IP spoofing
10base2
SYN flood
19. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
active
router
risk mitigation
false positive
20. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
VLAN
proxy
deny by default
PBX (Private Branch Exchange)
21. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
port address translation
DoS attacks
subnet
49 -152 - 65 -535
22. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
teardrop
smurf
blind
firewall architectures
23. Allows all traffic except traffic that is specifically denied - also known as permissive access
allow by default
firewalls
null session
stateful inspection
24. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
firewalls
protocol analyzer
router
coaxial
25. Connects devices together to form a subnet - broadcasts incoming packets to all devices
hub
subnet
behavior based
IP spoofing
26. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
HIDS
ping flooding
passive
multiple interface firewall
27. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
NIDS network connections
cat5
man in the middle and replay
NIDS
28. IP - email - website - DNS - and ARP
switch
packet filter
spoofing attacks
protocol analyzer
29. Amplifies the signal of incoming packets before broadcasting them to the network
NAT
website spoofing
repeater
tcp/ip hijacking
30. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
proxy
honeypot
active
null session
31. Twisted pair cable with speed capability of 10Mbps
DNS spoofing
router
cat3
bastion host
32. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
active
VLAN
SYN flood
ARP
33. Head of a packet contains...
ARP
false positive
source - destination - protocol
firewall architectures
34. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
land attack
packet filter
ping of death
website spoofing
35. Forging an IP address with the address of a trusted host
fiber optic
NIPS
false negative
IP spoofing
36. IDS response method using logging and notification
packet filter
passive
split horizon DNS
tcp/ip hijacking
37. A pool of public IP addresses is shared by a collection of private IP addresses
IP spoofing
spoofing
teardrop
dynamic NAT
38. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
coaxial
zone transfer
man in the middle and replay
VLAN
39. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
blind
ARP
IP spoofing
protocol
40. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
switch
proxy
spoofing attacks
DoS attacks
41. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
active
promiscuous
screened host
blind
42. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
0 - 1023
PBX (Private Branch Exchange)
bastion host
switch
43. Dynamic / private ports
49 -152 - 65 -535
session hijacking
proxy server
ARP
44. A sniffer mode used to capture traffic addressed to/from another machine on the network
multi homed
PBX (Private Branch Exchange)
promiscuous
encrypt session key
45. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
store and forward
switch
spoofing
replay
46. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
risk mitigation
NIDS network connections
firewalls
NIDS
47. Attempt to block service or reduce activity by overloading the victim machine with ping requests
blind
teardrop
encrypt session key
ping flooding
48. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
repeater
man in the middle and replay
IP spoofing
router
49. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
split horizon DNS
proxy
proxy server
spoofing
50. Known as thicknet - 10mbps - limited to 500 meters
10Base5
smurf
screened subnet
ping flooding