SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Network configuration that permits selected outsiders access internal information systems
0 - 1023
NIPS
screened subnet
extranet
2. A logical connection point allowing computers and software to communicate and exchange data
IP spoofing
fraggle
port
session hijacking
3. Evolved from IDS - monitors network traffic - detects and responds to attack on network
ping flooding
stateful inspection
proxy
NIPS
4. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
twisted pair
NAT
proxy server
content filter
5. Dynamic / private ports
zone transfer
protocol
49 -152 - 65 -535
packet filter
6. A complete transfer of all DNS zone information from one server to another
stateful inspection
split horizon DNS
NIDS
zone transfer
7. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
passive
split horizon DNS
honeypot
allow by default
8. IP - email - website - DNS - and ARP
ARP
split horizon DNS
spoofing
spoofing attacks
9. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
man in the middle and replay
cat5
ping of death
DNS spoofing
10. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
port address translation
ping of death
screened subnet
firewalls
11. Firewall with several NICs connected to different networks
multi homed
deny by default
ping flooding
twisted pair
12. Connects devices together to form a subnet - broadcasts incoming packets to all devices
passive
NAT
hub
port address translation
13. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
repeater
fiber optic
VLAN
session hijacking
14. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
cat5
man in the middle and replay
ARP poisoning
passive
15. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
NIDS network connections
0 - 1023
DNS spoofing
ARP poisoning
16. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
multi homed
zone transfer
false positive
man in the middle
17. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
screened subnet
honeynet
0 - 1023
18. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
ping of death
split horizon DNS
NIDS
defense in depth
19. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
dynamic NAT
extranet
multiple interface firewall
content filter
20. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
honeypot
store and forward
1024 - 49 -151
website spoofing
21. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
content filter
dual homed
protocol
smurf
22. Attempt to block service or reduce activity by overloading the victim machine with ping requests
ping flooding
fiber optic
10base2
DNS spoofing
23. Twisted pair cable with speed capability of 10Mbps
cat3
deny by default
encrypt session key
honeynet
24. A set of rules computers use to communicate with each other across a network
router
protocol
firewalls
multi homed
25. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
subnet
land attack
stateful inspection
protocol
26. Forging an IP address with the address of a trusted host
promiscuous
multi homed
IP spoofing
cat5
27. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
DNS spoofing
network
false positive
store and forward
28. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
10base2
stateful inspection
defense in depth
allow by default
29. A pool of public IP addresses is shared by a collection of private IP addresses
dynamic NAT
switch
false negative
cat3
30. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
0 - 1023
split horizon DNS
DoS attacks
firewalls
31. Examines a entire packet and determines action based on a complex set of rules
fiber optic
application gateway
1024 - 49 -151
source - destination - protocol
32. Acts as an organizations internal phone system
man in the middle and replay
NIDS network connections
application
PBX (Private Branch Exchange)
33. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
behavior based
router
blind
34. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
tcp/ip hijacking
multi homed
null session
firewalls
35. Collection on honeypots
session hijacking
honeynet
ping flooding
packet filter
36. A sniffer mode used to capture traffic addressed to/from another machine on the network
blind
promiscuous
application gateway
broadcast domain
37. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
teardrop
risk mitigation
split horizon DNS
multiple interface firewall
38. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
passive
land attack
router
port
39. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
1024 - 49 -151
proxy
informed
active
40. Man in the middle attack where the content of an intercepted message is altered before it is sent on
multiple interface firewall
firewall architectures
active
application gateway
41. A variation of a smurf attack using UDP
blind
fraggle
man in the middle and replay
switch
42. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
stateful inspection
0 - 1023
ARP
proxy
43. Bbenign activity reported as malicious
stateful inspection
man in the middle
false positive
NIDS
44. Protocol used to map an known IP address to its corresponding media access control (MAC) address
bastion host
IP spoofing
coaxial
ARP
45. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
private
session hijacking
static NAT
risk mitigation
46. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
packet filter
DMZ
fraggle
47. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
HIDS
10base2
coaxial
port
48. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
spoofing
stateful inspection
IP spoofing
NAT
49. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
port
behavior based
DoS attacks
1024 - 49 -151
50. IDS response method using logging and notification
proxy
dual homed
passive
hub