SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Known as thicknet - 10mbps - limited to 500 meters
active
10Base5
content filter
proxy
2. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
spoofing attacks
risk mitigation
behavior based
screened host
3. An attacker redirects traffic by falsifying the IP address requested by ARP request
10base2
ARP poisoning
honeypot
man in the middle and replay
4. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
firewall architectures
NIDS network connections
man in the middle and replay
spoofing attacks
5. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
ping flooding
fiber optic
ARP poisoning
null session
6. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
coaxial
NIDS
replay
7. A variation of a smurf attack using UDP
firewalls
router
IP spoofing
fraggle
8. Used to pass data from one VLAN to another
application
stateful inspection
router
NIDS
9. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
packet filter
0 - 1023
bastion host
encrypt session key
10. A logical connection point allowing computers and software to communicate and exchange data
dynamic NAT
false positive
port
application
11. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
coaxial
SYN flood
ARP
0 - 1023
12. A sniffer mode used to capture traffic addressed to/from another machine on the network
website spoofing
spoofing attacks
promiscuous
network
13. Forging an IP address with the address of a trusted host
defense in depth
10Base5
IP spoofing
content filter
14. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
ping of death
spoofing attacks
screened subnet
firewalls
15. Evolved from IDS - monitors network traffic - detects and responds to attack on network
NIPS
PBX (Private Branch Exchange)
cat3
DMZ
16. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
router
defense in depth
allow by default
passive
17. An application layer gateway works at this layer of the OSI model
hub
application
tcp/ip hijacking
firewalls
18. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
false negative
private
content filter
19. A server that sits between an intranet and it's Internet connection - masking all IP addresses
proxy server
false negative
multiple interface firewall
store and forward
20. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
split horizon DNS
NIDS
null session
10Base5
21. Collection on honeypots
honeynet
proxy
firewall architectures
IP spoofing
22. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
null session
informed
promiscuous
man in the middle
23. Packet filtering - proxies - stateful inspection
replay
10Base5
firewalls
multiple interface firewall
24. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
DMZ
10Base5
multiple interface firewall
broadcast domain
25. Attempt to block service or reduce activity by overloading the victim machine with ping requests
router
cat3
ping flooding
split horizon DNS
26. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
proxy
10base2
ping flooding
27. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
HIDS
fraggle
false positive
application
28. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
informed
land attack
NAT
IP spoofing
29. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
behavior based
ARP poisoning
ARP
proxy
30. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
NIDS
ping of death
screened subnet
packet filter
31. IDS that relies on the identification of known attack signatures
stateful inspection
knowledge based
land attack
NIDS
32. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
DoS attacks
subnet
null session
10base2
33. Examines a entire packet and determines action based on a complex set of rules
twisted pair
application gateway
passive
source - destination - protocol
34. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
informed
knowledge based
subnet
promiscuous
35. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
PBX (Private Branch Exchange)
split horizon DNS
repeater
ping flooding
36. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
fraggle
deny by default
null session
layered
37. Twisted pair cable with speed capability of 1Gbps
spoofing
private
cat5
49 -152 - 65 -535
38. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
static NAT
null session
false positive
honeypot
39. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
spoofing attacks
NIDS
NAT
coaxial
40. IDS response method using logging and notification
passive
behavior based
false negative
stateful inspection
41. Connects devices together to form a subnet - broadcasts incoming packets to all devices
1024 - 49 -151
hub
firewall architectures
DNS spoofing
42. Known as thinnet - 10mbps - limited to 185 meters
dynamic NAT
content filter
stateful inspection
10base2
43. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
encrypt session key
port address translation
deny by default
fraggle
44. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
application
store and forward
multi homed
defense in depth
45. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
spoofing attacks
ARP
allow by default
passive
46. IP - email - website - DNS - and ARP
spoofing attacks
proxy server
man in the middle
extranet
47. Acts as an organizations internal phone system
coaxial
PBX (Private Branch Exchange)
NIDS
10Base5
48. Protocol used to map an known IP address to its corresponding media access control (MAC) address
switch
firewall architectures
ARP
land attack
49. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
spoofing attacks
screened host
multi homed
tcp/ip hijacking
50. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
switch
behavior based
proxy
stateful inspection