SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
protocol analyzer
port
screened host
IP spoofing
2. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
IP spoofing
ping of death
PBX (Private Branch Exchange)
bastion host
3. IP spoofing attack where the attacker can only send packets and has to guess about replies
null session
multiple interface firewall
blind
broadcast domain
4. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
content filter
broadcast domain
protocol analyzer
encrypt session key
5. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
DNS spoofing
knowledge based
port
spoofing
6. Man in the middle attack where the content of an intercepted message is altered before it is sent on
stateful inspection
dynamic NAT
dual homed
active
7. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
multi homed
defense in depth
NAT
session hijacking
8. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
extranet
honeypot
passive
DMZ
9. A variation of a smurf attack using UDP
fraggle
split horizon DNS
active
DoS attacks
10. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
land attack
packet filter
deny by default
promiscuous
11. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
cat5
behavior based
twisted pair
screened host
12. A complete transfer of all DNS zone information from one server to another
PBX (Private Branch Exchange)
active
zone transfer
ping of death
13. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
stateful inspection
website spoofing
false negative
deny by default
14. Network configuration that permits selected outsiders access internal information systems
firewalls
49 -152 - 65 -535
extranet
spoofing attacks
15. An attacker redirects traffic by falsifying the IP address requested by ARP request
replay
NIDS
ARP poisoning
informed
16. Twisted pair cable with speed capability of 10Mbps
proxy server
DoS attacks
zone transfer
cat3
17. Protocol used to map an known IP address to its corresponding media access control (MAC) address
ARP
DMZ
spoofing
broadcast domain
18. Twisted pair cable with speed capability of 1Gbps
dual homed
twisted pair
ping flooding
cat5
19. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
VLAN
defense in depth
10base2
honeypot
20. IDS response method using logging and notification
PBX (Private Branch Exchange)
coaxial
passive
stateful inspection
21. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
passive
private
multiple interface firewall
tcp/ip hijacking
22. Examines a entire packet and determines action based on a complex set of rules
ping of death
firewalls
application gateway
switch
23. An application layer gateway works at this layer of the OSI model
honeypot
application
session hijacking
false negative
24. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
DNS spoofing
fiber optic
proxy
subnet
25. Acts as an organizations internal phone system
allow by default
false negative
PBX (Private Branch Exchange)
land attack
26. A set of rules computers use to communicate with each other across a network
protocol
1024 - 49 -151
ping flooding
spoofing attacks
27. Session hijacking countermeasure
IP spoofing
promiscuous
encrypt session key
NIDS
28. Bbenign activity reported as malicious
screened subnet
cat5
false positive
router
29. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
port address translation
ARP
blind
packet filter
30. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
protocol analyzer
NIDS
informed
application gateway
31. Malicious activity not reported or detected
screened subnet
stateful inspection
ARP
false negative
32. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
proxy
coaxial
firewalls
screened subnet
33. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
promiscuous
tcp/ip hijacking
port
fraggle
34. Firewall with several NICs connected to different networks
zone transfer
port
proxy server
multi homed
35. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
encrypt session key
honeynet
stateful inspection
dual homed
36. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
encrypt session key
ping flooding
10base2
man in the middle
37. Known as thinnet - 10mbps - limited to 185 meters
10base2
screened subnet
replay
cat3
38. Allows all traffic except traffic that is specifically denied - also known as permissive access
dynamic NAT
multi homed
screened subnet
allow by default
39. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
NIDS
hub
replay
null session
40. Known as thicknet - 10mbps - limited to 500 meters
IP spoofing
store and forward
honeynet
10Base5
41. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
switch
IP spoofing
PBX (Private Branch Exchange)
VLAN
42. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
HIDS
spoofing attacks
replay
store and forward
43. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
coaxial
DMZ
honeypot
extranet
44. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
smurf
NIPS
dual homed
DoS attacks
45. IP - email - website - DNS - and ARP
store and forward
website spoofing
application gateway
spoofing attacks
46. Amplifies the signal of incoming packets before broadcasting them to the network
store and forward
switch
repeater
land attack
47. Head of a packet contains...
blind
0 - 1023
source - destination - protocol
teardrop
48. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
risk mitigation
fiber optic
NIDS
NIDS network connections
49. IDS that relies on the identification of known attack signatures
knowledge based
honeypot
broadcast domain
fiber optic
50. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
blind
screened host
static NAT
dual homed