SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
NIDS
replay
active
network
2. Head of a packet contains...
multi homed
layered
source - destination - protocol
null session
3. A variation of a smurf attack using UDP
IP spoofing
fraggle
port address translation
screened host
4. Used to pass data from one VLAN to another
protocol analyzer
router
NIDS
application
5. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
active
layered
port
coaxial
6. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
DMZ
0 - 1023
risk mitigation
split horizon DNS
7. IDS that relies on the identification of known attack signatures
risk mitigation
knowledge based
NIDS
land attack
8. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
active
ARP poisoning
false positive
man in the middle
9. Firewall with several NICs connected to different networks
multi homed
proxy server
proxy
0 - 1023
10. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
fiber optic
passive
firewalls
land attack
11. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
DMZ
honeypot
IP spoofing
ping of death
12. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
protocol analyzer
website spoofing
ARP
behavior based
13. Monitors network traffic to identify possible attacks
teardrop
IP spoofing
NIDS
cat3
14. A logical connection point allowing computers and software to communicate and exchange data
honeypot
0 - 1023
ARP
port
15. Packet filtering - proxies - stateful inspection
session hijacking
firewalls
null session
encrypt session key
16. Session hijacking countermeasure
website spoofing
encrypt session key
DMZ
application gateway
17. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
informed
0 - 1023
active
switch
18. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
tcp/ip hijacking
replay
website spoofing
content filter
19. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
repeater
IP spoofing
stateful inspection
IP spoofing
20. Amplifies the signal of incoming packets before broadcasting them to the network
twisted pair
repeater
content filter
replay
21. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
behavior based
twisted pair
split horizon DNS
10base2
22. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
session hijacking
0 - 1023
honeynet
teardrop
23. Protocol used to map an known IP address to its corresponding media access control (MAC) address
ARP
HIDS
49 -152 - 65 -535
dual homed
24. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
protocol analyzer
stateful inspection
port address translation
store and forward
25. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
man in the middle and replay
promiscuous
null session
application gateway
26. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
NIDS
man in the middle and replay
store and forward
subnet
27. Allows all traffic except traffic that is specifically denied - also known as permissive access
null session
allow by default
VLAN
DNS spoofing
28. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
screened host
content filter
broadcast domain
router
29. A packet filtering firewall works at this layer of the OSI model
bastion host
man in the middle and replay
network
packet filter
30. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
null session
private
promiscuous
screened host
31. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
fiber optic
tcp/ip hijacking
null session
firewalls
32. IP - email - website - DNS - and ARP
ARP poisoning
proxy
spoofing attacks
informed
33. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
stateful inspection
split horizon DNS
repeater
router
34. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
split horizon DNS
private
proxy
IP spoofing
35. Dynamic / private ports
null session
49 -152 - 65 -535
ARP poisoning
static NAT
36. Malicious activity not reported or detected
false negative
screened host
teardrop
proxy
37. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
hub
defense in depth
HIDS
false negative
38. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
10base2
switch
NIDS
NAT
39. Evolved from IDS - monitors network traffic - detects and responds to attack on network
spoofing
NIPS
bastion host
screened subnet
40. A pool of public IP addresses is shared by a collection of private IP addresses
extranet
spoofing
knowledge based
dynamic NAT
41. User / registered ports
smurf
risk mitigation
active
1024 - 49 -151
42. Connects devices together to form a subnet - broadcasts incoming packets to all devices
session hijacking
hub
blind
switch
43. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
10Base5
IP spoofing
dual homed
proxy
44. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
NIPS
risk mitigation
ARP poisoning
IP spoofing
45. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
twisted pair
blind
encrypt session key
multiple interface firewall
46. Examines a entire packet and determines action based on a complex set of rules
multi homed
application gateway
VLAN
null session
47. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
protocol analyzer
spoofing attacks
router
honeynet
48. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
10Base5
defense in depth
firewall architectures
49 -152 - 65 -535
49. IPS response method - terminate process/session - block/reject and redirect network traffic
extranet
1024 - 49 -151
router
active
50. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
passive
router
spoofing attacks
firewalls