SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
bastion host
screened host
switch
DMZ
2. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
1024 - 49 -151
switch
IP spoofing
coaxial
3. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
router
behavior based
defense in depth
allow by default
4. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
active
bastion host
NIDS network connections
ping of death
5. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
repeater
honeynet
multiple interface firewall
proxy
6. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
0 - 1023
router
null session
IP spoofing
7. Used to pass data from one VLAN to another
spoofing
active
NIDS network connections
router
8. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
split horizon DNS
router
ARP poisoning
stateful inspection
9. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
packet filter
subnet
0 - 1023
HIDS
10. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
NIDS
twisted pair
VLAN
zone transfer
11. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
passive
NIDS
private
firewalls
12. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
private
IP spoofing
DNS spoofing
dual homed
13. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
store and forward
application gateway
packet filter
subnet
14. Forging an IP address with the address of a trusted host
null session
proxy
screened subnet
IP spoofing
15. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
network
VLAN
stateful inspection
proxy
16. Examines a entire packet and determines action based on a complex set of rules
application gateway
promiscuous
source - destination - protocol
website spoofing
17. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
ARP
zone transfer
router
0 - 1023
18. A complete transfer of all DNS zone information from one server to another
zone transfer
NIDS network connections
cat5
application gateway
19. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
NAT
firewalls
bastion host
SYN flood
20. IDS response method using logging and notification
active
cat3
promiscuous
passive
21. One private IP address is mapped to one public IP address
screened host
static NAT
NIPS
source - destination - protocol
22. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
fiber optic
protocol
session hijacking
screened subnet
23. Head of a packet contains...
source - destination - protocol
NIDS
dual homed
content filter
24. A pool of public IP addresses is shared by a collection of private IP addresses
content filter
passive
dynamic NAT
encrypt session key
25. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
proxy server
active
DNS spoofing
honeypot
26. Evolved from IDS - monitors network traffic - detects and responds to attack on network
repeater
spoofing attacks
hub
NIPS
27. Protocol used to map an known IP address to its corresponding media access control (MAC) address
ARP
multiple interface firewall
0 - 1023
PBX (Private Branch Exchange)
28. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
coaxial
ping of death
1024 - 49 -151
man in the middle
29. IDS that relies on the identification of known attack signatures
NIPS
cat3
bastion host
knowledge based
30. Bbenign activity reported as malicious
false positive
application
hub
screened subnet
31. IP - email - website - DNS - and ARP
informed
null session
spoofing attacks
website spoofing
32. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
HIDS
spoofing
dynamic NAT
informed
33. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
encrypt session key
stateful inspection
proxy
risk mitigation
34. Malicious activity not reported or detected
false negative
active
layered
IP spoofing
35. Twisted pair cable with speed capability of 10Mbps
split horizon DNS
cat3
session hijacking
man in the middle and replay
36. User / registered ports
null session
NIDS network connections
1024 - 49 -151
port address translation
37. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
NIPS
router
null session
screened host
38. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
0 - 1023
IP spoofing
protocol
false positive
39. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
null session
honeypot
behavior based
10Base5
40. Allows all traffic except traffic that is specifically denied - also known as permissive access
spoofing
allow by default
IP spoofing
honeynet
41. Network configuration that permits selected outsiders access internal information systems
false positive
extranet
protocol
website spoofing
42. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
broadcast domain
honeypot
tcp/ip hijacking
static NAT
43. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
man in the middle
twisted pair
10base2
44. A server that sits between an intranet and it's Internet connection - masking all IP addresses
extranet
session hijacking
multiple interface firewall
proxy server
45. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
bastion host
replay
split horizon DNS
protocol analyzer
46. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
0 - 1023
source - destination - protocol
land attack
informed
47. IP spoofing attack where the attacker can only send packets and has to guess about replies
NAT
website spoofing
blind
screened subnet
48. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
promiscuous
man in the middle and replay
encrypt session key
land attack
49. Acts as an organizations internal phone system
false negative
store and forward
PBX (Private Branch Exchange)
promiscuous
50. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
false negative
subnet
active
knowledge based