SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol used to map an known IP address to its corresponding media access control (MAC) address
extranet
screened host
ARP
honeynet
2. Evolved from IDS - monitors network traffic - detects and responds to attack on network
firewalls
man in the middle
stateful inspection
NIPS
3. A set of rules computers use to communicate with each other across a network
screened subnet
promiscuous
protocol
risk mitigation
4. Amplifies the signal of incoming packets before broadcasting them to the network
repeater
ping of death
content filter
cat3
5. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
knowledge based
fiber optic
blind
screened subnet
6. Acts as an organizations internal phone system
NIDS network connections
informed
PBX (Private Branch Exchange)
hub
7. Known as thicknet - 10mbps - limited to 500 meters
passive
10Base5
passive
ARP
8. Known as thinnet - 10mbps - limited to 185 meters
stateful inspection
firewalls
land attack
10base2
9. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
repeater
screened host
informed
NIDS
10. IDS response method using logging and notification
passive
source - destination - protocol
PBX (Private Branch Exchange)
man in the middle
11. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
firewalls
false negative
packet filter
proxy
12. Session hijacking countermeasure
IP spoofing
encrypt session key
stateful inspection
passive
13. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
proxy
twisted pair
static NAT
0 - 1023
14. Monitors network traffic to identify possible attacks
repeater
NIDS
passive
allow by default
15. Packet filtering - proxies - stateful inspection
PBX (Private Branch Exchange)
firewalls
behavior based
null session
16. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
twisted pair
land attack
tcp/ip hijacking
defense in depth
17. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
proxy server
dynamic NAT
firewall architectures
private
18. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
proxy
coaxial
firewall architectures
network
19. An application layer gateway works at this layer of the OSI model
broadcast domain
application
store and forward
extranet
20. Attempt to block service or reduce activity by overloading the victim machine with ping requests
proxy
ping flooding
proxy server
knowledge based
21. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
honeynet
fraggle
screened host
null session
22. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
tcp/ip hijacking
DoS attacks
HIDS
stateful inspection
23. Level 2 firewall often used to filter web traffic
proxy server
ARP
PBX (Private Branch Exchange)
proxy
24. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
NAT
session hijacking
behavior based
dual homed
25. IP - email - website - DNS - and ARP
switch
behavior based
spoofing attacks
informed
26. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
packet filter
zone transfer
DMZ
SYN flood
27. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
IP spoofing
NIDS network connections
DNS spoofing
0 - 1023
28. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
NAT
teardrop
firewalls
passive
29. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
packet filter
PBX (Private Branch Exchange)
passive
fraggle
30. Twisted pair cable with speed capability of 1Gbps
cat3
ARP poisoning
deny by default
cat5
31. A complete transfer of all DNS zone information from one server to another
zone transfer
firewalls
land attack
replay
32. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
bastion host
application gateway
smurf
private
33. IDS that relies on the identification of known attack signatures
knowledge based
DNS spoofing
HIDS
honeynet
34. Twisted pair cable with speed capability of 10Mbps
proxy server
protocol
defense in depth
cat3
35. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
ping of death
deny by default
multi homed
spoofing
36. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
stateful inspection
hub
DoS attacks
smurf
37. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
application gateway
DNS spoofing
active
10Base5
38. Examines a entire packet and determines action based on a complex set of rules
false positive
spoofing attacks
content filter
application gateway
39. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
firewalls
null session
stateful inspection
multi homed
40. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
NIDS
extranet
split horizon DNS
port address translation
41. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
packet filter
broadcast domain
proxy server
defense in depth
42. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
10base2
1024 - 49 -151
multiple interface firewall
43. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
cat5
NIDS
layered
coaxial
44. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
router
null session
SYN flood
screened subnet
45. An attacker redirects traffic by falsifying the IP address requested by ARP request
NIPS
ARP poisoning
packet filter
application gateway
46. Used to pass data from one VLAN to another
dual homed
subnet
IP spoofing
router
47. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
tcp/ip hijacking
twisted pair
IP spoofing
cat3
48. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
DNS spoofing
NIDS
DMZ
cat5
49. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
coaxial
ARP poisoning
zone transfer
promiscuous
50. Firewall with several NICs connected to different networks
port address translation
knowledge based
multi homed
firewalls