SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Session hijacking countermeasure
zone transfer
DNS spoofing
10Base5
encrypt session key
2. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
land attack
defense in depth
null session
website spoofing
3. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
firewall architectures
stateful inspection
broadcast domain
ping flooding
4. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
multiple interface firewall
cat3
layered
smurf
5. IDS response method using logging and notification
passive
proxy
application gateway
NIPS
6. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
land attack
NIDS
twisted pair
spoofing
7. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
private
split horizon DNS
null session
land attack
8. IDS that relies on the identification of known attack signatures
NIDS network connections
static NAT
false negative
knowledge based
9. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
source - destination - protocol
split horizon DNS
NIDS
layered
10. Allows all traffic except traffic that is specifically denied - also known as permissive access
network
cat5
allow by default
10Base5
11. Forging an IP address with the address of a trusted host
tcp/ip hijacking
protocol
passive
IP spoofing
12. A variation of a smurf attack using UDP
fraggle
false positive
broadcast domain
VLAN
13. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
network
10base2
packet filter
null session
14. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
defense in depth
proxy
router
protocol analyzer
15. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
VLAN
NIDS
content filter
bastion host
16. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
defense in depth
blind
spoofing attacks
passive
17. Packet filtering - proxies - stateful inspection
firewalls
port
dynamic NAT
HIDS
18. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
cat5
website spoofing
application
teardrop
19. A logical connection point allowing computers and software to communicate and exchange data
packet filter
fraggle
stateful inspection
port
20. Twisted pair cable with speed capability of 10Mbps
hub
cat3
informed
risk mitigation
21. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
spoofing
protocol
IP spoofing
coaxial
22. Head of a packet contains...
NIDS
source - destination - protocol
firewalls
repeater
23. One private IP address is mapped to one public IP address
static NAT
VLAN
49 -152 - 65 -535
website spoofing
24. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
fraggle
null session
router
IP spoofing
25. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
active
session hijacking
behavior based
DoS attacks
26. An application layer gateway works at this layer of the OSI model
application
10base2
active
application gateway
27. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
cat5
HIDS
49 -152 - 65 -535
allow by default
28. A sniffer mode used to capture traffic addressed to/from another machine on the network
promiscuous
fraggle
NIDS
false positive
29. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
promiscuous
ping of death
behavior based
subnet
30. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
honeypot
IP spoofing
port address translation
SYN flood
31. Bbenign activity reported as malicious
packet filter
false positive
ping flooding
false negative
32. Used to pass data from one VLAN to another
protocol
router
hub
coaxial
33. Acts as an organizations internal phone system
PBX (Private Branch Exchange)
0 - 1023
repeater
false negative
34. Known as thicknet - 10mbps - limited to 500 meters
layered
extranet
packet filter
10Base5
35. IP - email - website - DNS - and ARP
spoofing attacks
broadcast domain
NIDS
risk mitigation
36. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
man in the middle and replay
switch
fiber optic
37. Evolved from IDS - monitors network traffic - detects and responds to attack on network
protocol analyzer
knowledge based
NIPS
router
38. IP spoofing attack where the attacker can only send packets and has to guess about replies
content filter
IP spoofing
blind
passive
39. User / registered ports
1024 - 49 -151
cat3
store and forward
zone transfer
40. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
firewalls
tcp/ip hijacking
NIDS
proxy
41. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
smurf
10Base5
deny by default
42. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
router
passive
deny by default
informed
43. Attempt to block service or reduce activity by overloading the victim machine with ping requests
packet filter
ping flooding
screened subnet
multi homed
44. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
stateful inspection
defense in depth
store and forward
null session
45. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
zone transfer
NIDS
application
deny by default
46. Connects devices together to form a subnet - broadcasts incoming packets to all devices
layered
network
hub
broadcast domain
47. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
false positive
split horizon DNS
informed
application gateway
48. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
zone transfer
null session
DoS attacks
router
49. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
coaxial
port
proxy server
repeater
50. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
session hijacking
NAT
null session
router