SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
blind
subnet
protocol analyzer
firewall architectures
2. Connects devices together to form a subnet - broadcasts incoming packets to all devices
extranet
content filter
hub
knowledge based
3. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
dynamic NAT
subnet
man in the middle
4. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
cat3
IP spoofing
DNS spoofing
screened subnet
5. Level 2 firewall often used to filter web traffic
knowledge based
proxy
10Base5
zone transfer
6. A pool of public IP addresses is shared by a collection of private IP addresses
dynamic NAT
private
dual homed
port
7. Attempt to block service or reduce activity by overloading the victim machine with ping requests
ping flooding
multi homed
1024 - 49 -151
router
8. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
tcp/ip hijacking
man in the middle
10Base5
stateful inspection
9. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
proxy server
tcp/ip hijacking
DoS attacks
application
10. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
coaxial
ping of death
land attack
HIDS
11. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
land attack
application
website spoofing
man in the middle
12. Monitors network traffic to identify possible attacks
screened subnet
fiber optic
multi homed
NIDS
13. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
IP spoofing
bastion host
screened subnet
NIPS
14. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
NIDS
port
man in the middle
NAT
15. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
multi homed
spoofing
informed
IP spoofing
16. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
hub
null session
10Base5
stateful inspection
17. A set of rules computers use to communicate with each other across a network
protocol
split horizon DNS
content filter
dual homed
18. Bbenign activity reported as malicious
honeynet
NIPS
stateful inspection
false positive
19. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
proxy
screened subnet
NIPS
IP spoofing
20. Known as thicknet - 10mbps - limited to 500 meters
subnet
application
bastion host
10Base5
21. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
stateful inspection
fiber optic
bastion host
port address translation
22. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
NAT
risk mitigation
49 -152 - 65 -535
screened subnet
23. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
static NAT
smurf
split horizon DNS
NIPS
24. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
teardrop
split horizon DNS
multi homed
NIDS network connections
25. IDS response method using logging and notification
DMZ
encrypt session key
SYN flood
passive
26. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
NAT
10base2
DMZ
cat3
27. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
IP spoofing
deny by default
router
coaxial
28. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
encrypt session key
passive
man in the middle and replay
screened subnet
29. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
allow by default
replay
behavior based
firewalls
30. IDS that relies on the identification of known attack signatures
encrypt session key
knowledge based
behavior based
spoofing attacks
31. A logical connection point allowing computers and software to communicate and exchange data
port
firewalls
NIDS
application
32. A server that sits between an intranet and it's Internet connection - masking all IP addresses
proxy server
false positive
port address translation
website spoofing
33. IPS response method - terminate process/session - block/reject and redirect network traffic
active
packet filter
promiscuous
1024 - 49 -151
34. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
bastion host
defense in depth
dynamic NAT
stateful inspection
35. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
zone transfer
bastion host
ping flooding
36. A sniffer mode used to capture traffic addressed to/from another machine on the network
land attack
null session
promiscuous
multiple interface firewall
37. Firewall with several NICs connected to different networks
multi homed
promiscuous
coaxial
behavior based
38. IP spoofing attack where the attacker can only send packets and has to guess about replies
behavior based
blind
informed
twisted pair
39. Head of a packet contains...
source - destination - protocol
smurf
repeater
ARP
40. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
0 - 1023
proxy
honeynet
promiscuous
41. Malicious activity not reported or detected
proxy
land attack
knowledge based
false negative
42. Collection on honeypots
honeynet
twisted pair
session hijacking
NIDS
43. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
proxy
passive
HIDS
blind
44. Packet filtering - proxies - stateful inspection
false positive
stateful inspection
store and forward
firewalls
45. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
website spoofing
twisted pair
IP spoofing
active
46. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
NIDS network connections
proxy server
router
risk mitigation
47. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
layered
VLAN
tcp/ip hijacking
ping flooding
48. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
NAT
port address translation
allow by default
false positive
49. Used to pass data from one VLAN to another
fraggle
spoofing attacks
router
false negative
50. Allows all traffic except traffic that is specifically denied - also known as permissive access
allow by default
split horizon DNS
packet filter
port address translation