SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
ping flooding
fiber optic
store and forward
DNS spoofing
2. Protocol used to map an known IP address to its corresponding media access control (MAC) address
NIPS
ping of death
ARP
risk mitigation
3. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
firewalls
spoofing
multi homed
router
4. Allows all traffic except traffic that is specifically denied - also known as permissive access
allow by default
NIDS
application
ping flooding
5. Collection on honeypots
protocol
honeynet
switch
zone transfer
6. IDS that relies on the identification of known attack signatures
broadcast domain
knowledge based
cat3
dynamic NAT
7. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
fraggle
HIDS
dual homed
private
8. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
0 - 1023
risk mitigation
NIDS
cat3
9. Attempt to block service or reduce activity by overloading the victim machine with ping requests
dual homed
NIPS
ping flooding
fraggle
10. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
NIDS network connections
behavior based
IP spoofing
allow by default
11. Firewall with several NICs connected to different networks
bastion host
packet filter
port address translation
multi homed
12. A pool of public IP addresses is shared by a collection of private IP addresses
VLAN
dynamic NAT
active
IP spoofing
13. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
HIDS
bastion host
null session
1024 - 49 -151
14. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
subnet
firewall architectures
ping flooding
protocol analyzer
15. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
0 - 1023
port address translation
twisted pair
man in the middle
16. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
active
subnet
null session
risk mitigation
17. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
bastion host
stateful inspection
content filter
proxy
18. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
false negative
network
subnet
passive
19. Monitors network traffic to identify possible attacks
NIDS
HIDS
store and forward
proxy
20. Connects devices together to form a subnet - broadcasts incoming packets to all devices
fraggle
twisted pair
defense in depth
hub
21. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
multi homed
smurf
screened subnet
active
22. Bbenign activity reported as malicious
active
store and forward
false positive
NAT
23. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
blind
IP spoofing
ping flooding
split horizon DNS
24. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
IP spoofing
fiber optic
active
man in the middle and replay
25. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
private
smurf
VLAN
protocol analyzer
26. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
49 -152 - 65 -535
coaxial
active
session hijacking
27. A complete transfer of all DNS zone information from one server to another
proxy
zone transfer
application
fiber optic
28. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
NIPS
network
deny by default
DMZ
29. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
protocol analyzer
store and forward
static NAT
multi homed
30. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
ARP poisoning
PBX (Private Branch Exchange)
DoS attacks
10base2
31. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
spoofing attacks
coaxial
active
screened host
32. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
port address translation
dynamic NAT
stateful inspection
land attack
33. A set of rules computers use to communicate with each other across a network
null session
protocol
cat3
subnet
34. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
dynamic NAT
IP spoofing
hub
35. Twisted pair cable with speed capability of 1Gbps
proxy server
deny by default
cat5
PBX (Private Branch Exchange)
36. Packet filtering - proxies - stateful inspection
firewalls
risk mitigation
fraggle
land attack
37. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
IP spoofing
defense in depth
subnet
multi homed
38. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
VLAN
stateful inspection
false negative
router
39. Used to pass data from one VLAN to another
router
VLAN
HIDS
NIDS network connections
40. Level 2 firewall often used to filter web traffic
switch
proxy server
informed
proxy
41. Network configuration that permits selected outsiders access internal information systems
ping flooding
coaxial
extranet
switch
42. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
encrypt session key
deny by default
active
static NAT
43. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
website spoofing
knowledge based
HIDS
44. Known as thicknet - 10mbps - limited to 500 meters
router
ARP poisoning
application gateway
10Base5
45. Head of a packet contains...
man in the middle and replay
source - destination - protocol
ARP
zone transfer
46. Known as thinnet - 10mbps - limited to 185 meters
0 - 1023
10base2
VLAN
replay
47. A logical connection point allowing computers and software to communicate and exchange data
ARP
teardrop
twisted pair
port
48. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
DoS attacks
SYN flood
hub
49. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
NIDS
stateful inspection
0 - 1023
firewalls
50. Acts as an organizations internal phone system
PBX (Private Branch Exchange)
layered
49 -152 - 65 -535
passive
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests