SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
10Base5
VLAN
firewalls
twisted pair
2. Bbenign activity reported as malicious
risk mitigation
spoofing
promiscuous
false positive
3. Man in the middle attack where the content of an intercepted message is altered before it is sent on
active
split horizon DNS
static NAT
session hijacking
4. Collection on honeypots
zone transfer
spoofing attacks
deny by default
honeynet
5. An application layer gateway works at this layer of the OSI model
active
NIPS
application
blind
6. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
null session
land attack
hub
broadcast domain
7. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
DoS attacks
source - destination - protocol
ping of death
active
8. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
application
ping flooding
false negative
store and forward
9. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
IP spoofing
teardrop
NIDS network connections
spoofing
10. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
smurf
proxy
DMZ
subnet
11. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
layered
protocol analyzer
screened host
dual homed
12. Firewall with several NICs connected to different networks
layered
passive
multi homed
tcp/ip hijacking
13. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
active
cat3
repeater
DMZ
14. A logical connection point allowing computers and software to communicate and exchange data
subnet
port
application
49 -152 - 65 -535
15. Known as thicknet - 10mbps - limited to 500 meters
10Base5
active
VLAN
session hijacking
16. A server that sits between an intranet and it's Internet connection - masking all IP addresses
zone transfer
false positive
10Base5
proxy server
17. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
packet filter
store and forward
10Base5
passive
18. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
stateful inspection
session hijacking
dual homed
screened subnet
19. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
twisted pair
layered
blind
private
20. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
hub
fraggle
VLAN
ARP
21. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
cat3
risk mitigation
false negative
tcp/ip hijacking
22. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
teardrop
10base2
land attack
behavior based
23. User / registered ports
firewalls
content filter
1024 - 49 -151
dynamic NAT
24. Known as thinnet - 10mbps - limited to 185 meters
10base2
extranet
bastion host
0 - 1023
25. Allows all traffic except traffic that is specifically denied - also known as permissive access
switch
allow by default
knowledge based
port
26. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
fiber optic
passive
session hijacking
extranet
27. A set of rules computers use to communicate with each other across a network
hub
deny by default
blind
protocol
28. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
passive
layered
land attack
NIDS
29. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
false positive
DNS spoofing
man in the middle
null session
30. A variation of a smurf attack using UDP
DMZ
tcp/ip hijacking
fraggle
PBX (Private Branch Exchange)
31. Evolved from IDS - monitors network traffic - detects and responds to attack on network
ARP
IP spoofing
NAT
NIPS
32. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
null session
encrypt session key
NIPS
twisted pair
33. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
extranet
content filter
knowledge based
PBX (Private Branch Exchange)
34. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
layered
false negative
content filter
broadcast domain
35. IDS that relies on the identification of known attack signatures
knowledge based
proxy
NIPS
informed
36. Acts as an organizations internal phone system
defense in depth
twisted pair
proxy
PBX (Private Branch Exchange)
37. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
spoofing
protocol analyzer
10Base5
source - destination - protocol
38. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
DoS attacks
teardrop
HIDS
stateful inspection
39. One private IP address is mapped to one public IP address
static NAT
protocol
0 - 1023
ping flooding
40. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
DNS spoofing
spoofing
screened host
router
41. Packet filtering - proxies - stateful inspection
ping flooding
hub
firewalls
IP spoofing
42. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
website spoofing
zone transfer
smurf
defense in depth
43. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
NIPS
fraggle
replay
NIDS network connections
44. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
passive
honeynet
split horizon DNS
ARP poisoning
45. Monitors network traffic to identify possible attacks
NIPS
man in the middle
proxy server
NIDS
46. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
allow by default
DoS attacks
NIDS
blind
47. A packet filtering firewall works at this layer of the OSI model
network
hub
DMZ
coaxial
48. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
informed
router
allow by default
stateful inspection
49. IPS response method - terminate process/session - block/reject and redirect network traffic
private
active
null session
honeypot
50. Attempt to block service or reduce activity by overloading the victim machine with ping requests
ping flooding
network
stateful inspection
spoofing