SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Dynamic / private ports
multiple interface firewall
encrypt session key
hub
49 -152 - 65 -535
2. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
10base2
fiber optic
HIDS
man in the middle and replay
3. Packet filtering - proxies - stateful inspection
application gateway
firewalls
store and forward
IP spoofing
4. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
bastion host
coaxial
screened subnet
zone transfer
5. Known as thicknet - 10mbps - limited to 500 meters
layered
risk mitigation
10Base5
DNS spoofing
6. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
deny by default
website spoofing
fraggle
packet filter
7. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
honeynet
behavior based
promiscuous
application gateway
8. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
store and forward
risk mitigation
DNS spoofing
proxy
9. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
allow by default
spoofing
49 -152 - 65 -535
application
10. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
land attack
defense in depth
store and forward
NIDS network connections
11. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
private
active
IP spoofing
10base2
12. IPS response method - terminate process/session - block/reject and redirect network traffic
active
land attack
multiple interface firewall
NAT
13. Network configuration that permits selected outsiders access internal information systems
cat3
subnet
extranet
false negative
14. A sniffer mode used to capture traffic addressed to/from another machine on the network
twisted pair
promiscuous
spoofing attacks
DMZ
15. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
active
packet filter
firewalls
risk mitigation
16. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
knowledge based
NIDS
spoofing
null session
17. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
risk mitigation
website spoofing
proxy
encrypt session key
18. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
router
VLAN
twisted pair
stateful inspection
19. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
VLAN
dynamic NAT
false negative
static NAT
20. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
router
0 - 1023
VLAN
IP spoofing
21. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
IP spoofing
NIDS network connections
replay
layered
22. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
10base2
coaxial
repeater
stateful inspection
23. Session hijacking countermeasure
source - destination - protocol
hub
passive
encrypt session key
24. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
proxy
passive
replay
null session
25. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
knowledge based
false negative
DNS spoofing
26. Used to pass data from one VLAN to another
router
10base2
dual homed
behavior based
27. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
proxy
subnet
private
false negative
28. Malicious activity not reported or detected
router
ARP
subnet
false negative
29. Attempt to block service or reduce activity by overloading the victim machine with ping requests
informed
hub
ping flooding
website spoofing
30. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
NIDS
passive
false negative
switch
31. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
firewalls
multi homed
protocol analyzer
switch
32. Forging an IP address with the address of a trusted host
IP spoofing
screened host
land attack
application gateway
33. Examines a entire packet and determines action based on a complex set of rules
application gateway
land attack
broadcast domain
null session
34. One private IP address is mapped to one public IP address
static NAT
NIPS
49 -152 - 65 -535
honeypot
35. Monitors network traffic to identify possible attacks
NIDS
behavior based
teardrop
ARP poisoning
36. A pool of public IP addresses is shared by a collection of private IP addresses
IP spoofing
49 -152 - 65 -535
dynamic NAT
broadcast domain
37. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
spoofing attacks
land attack
application
man in the middle
38. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
IP spoofing
repeater
subnet
application gateway
39. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
risk mitigation
protocol
NIDS
1024 - 49 -151
40. Acts as an organizations internal phone system
PBX (Private Branch Exchange)
allow by default
tcp/ip hijacking
ping flooding
41. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
smurf
ARP poisoning
DNS spoofing
stateful inspection
42. Protocol used to map an known IP address to its corresponding media access control (MAC) address
ARP
false negative
split horizon DNS
promiscuous
43. User / registered ports
coaxial
informed
49 -152 - 65 -535
1024 - 49 -151
44. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
application
10base2
NIDS
layered
45. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
man in the middle
honeypot
network
spoofing attacks
46. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
content filter
NIDS
IP spoofing
cat5
47. Evolved from IDS - monitors network traffic - detects and responds to attack on network
proxy
HIDS
NIPS
active
48. IDS response method using logging and notification
cat5
proxy server
source - destination - protocol
passive
49. Allows all traffic except traffic that is specifically denied - also known as permissive access
allow by default
ping flooding
informed
10Base5
50. A server that sits between an intranet and it's Internet connection - masking all IP addresses
proxy server
49 -152 - 65 -535
session hijacking
honeynet