SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Connects devices together to form a subnet - broadcasts incoming packets to all devices
spoofing
behavior based
null session
hub
2. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
1024 - 49 -151
packet filter
10base2
3. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
tcp/ip hijacking
blind
protocol analyzer
session hijacking
4. Used to pass data from one VLAN to another
DMZ
router
HIDS
false positive
5. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
switch
network
private
layered
6. A complete transfer of all DNS zone information from one server to another
SYN flood
10Base5
cat5
zone transfer
7. Examines a entire packet and determines action based on a complex set of rules
switch
false negative
10Base5
application gateway
8. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
fraggle
passive
source - destination - protocol
informed
9. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
spoofing
proxy
layered
HIDS
10. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
static NAT
proxy
tcp/ip hijacking
spoofing
11. Known as thicknet - 10mbps - limited to 500 meters
NIDS network connections
1024 - 49 -151
10Base5
screened host
12. Firewall with several NICs connected to different networks
ARP poisoning
multi homed
router
application
13. Packet filtering - proxies - stateful inspection
active
NIPS
ARP poisoning
firewalls
14. User / registered ports
router
content filter
firewall architectures
1024 - 49 -151
15. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
null session
risk mitigation
replay
passive
16. A packet filtering firewall works at this layer of the OSI model
teardrop
active
49 -152 - 65 -535
network
17. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
NIDS network connections
split horizon DNS
VLAN
defense in depth
18. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
defense in depth
packet filter
teardrop
subnet
19. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
NAT
DNS spoofing
proxy
replay
20. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
IP spoofing
null session
split horizon DNS
VLAN
21. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
source - destination - protocol
49 -152 - 65 -535
VLAN
smurf
22. Network configuration that permits selected outsiders access internal information systems
tcp/ip hijacking
extranet
VLAN
spoofing attacks
23. IP - email - website - DNS - and ARP
multi homed
spoofing attacks
allow by default
layered
24. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
source - destination - protocol
packet filter
ARP
zone transfer
25. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
application
private
router
fiber optic
26. Amplifies the signal of incoming packets before broadcasting them to the network
land attack
IP spoofing
application
repeater
27. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
teardrop
NIDS
broadcast domain
ARP poisoning
28. A server that sits between an intranet and it's Internet connection - masking all IP addresses
passive
packet filter
firewalls
proxy server
29. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
deny by default
49 -152 - 65 -535
ping of death
website spoofing
30. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
null session
informed
PBX (Private Branch Exchange)
switch
31. Protocol used to map an known IP address to its corresponding media access control (MAC) address
spoofing attacks
ARP
application
proxy
32. Level 2 firewall often used to filter web traffic
risk mitigation
PBX (Private Branch Exchange)
false negative
proxy
33. IDS response method using logging and notification
0 - 1023
router
passive
private
34. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
stateful inspection
proxy
active
SYN flood
35. Known as thinnet - 10mbps - limited to 185 meters
10base2
informed
screened subnet
passive
36. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
promiscuous
land attack
firewalls
static NAT
37. Forging an IP address with the address of a trusted host
IP spoofing
switch
promiscuous
NAT
38. A pool of public IP addresses is shared by a collection of private IP addresses
ping of death
dynamic NAT
layered
deny by default
39. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
store and forward
null session
man in the middle
40. IDS that relies on the identification of known attack signatures
protocol
knowledge based
10base2
land attack
41. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
twisted pair
layered
proxy
screened subnet
42. Twisted pair cable with speed capability of 1Gbps
port
private
cat5
0 - 1023
43. IP spoofing attack where the attacker can only send packets and has to guess about replies
blind
website spoofing
ping of death
port
44. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
risk mitigation
replay
null session
firewalls
45. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
NIDS
SYN flood
bastion host
content filter
46. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
port address translation
protocol analyzer
DNS spoofing
port
47. Monitors network traffic to identify possible attacks
NIDS
application
coaxial
NIDS network connections
48. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
honeynet
website spoofing
behavior based
ping flooding
49. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
stateful inspection
passive
ping of death
HIDS
50. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
risk mitigation
NIDS
man in the middle and replay
SYN flood