SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Head of a packet contains...
source - destination - protocol
NIDS
application gateway
cat3
2. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
1024 - 49 -151
extranet
replay
proxy
3. Known as thinnet - 10mbps - limited to 185 meters
behavior based
deny by default
10base2
application
4. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
NIDS
multiple interface firewall
HIDS
repeater
5. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
DNS spoofing
0 - 1023
passive
proxy
6. Network configuration that permits selected outsiders access internal information systems
DMZ
extranet
replay
cat3
7. Examines a entire packet and determines action based on a complex set of rules
replay
informed
application gateway
stateful inspection
8. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
NAT
extranet
man in the middle and replay
9. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
cat3
coaxial
session hijacking
hub
10. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
IP spoofing
0 - 1023
man in the middle
subnet
11. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
dynamic NAT
stateful inspection
active
IP spoofing
12. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
NIPS
0 - 1023
encrypt session key
land attack
13. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
man in the middle
stateful inspection
cat3
private
14. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
protocol analyzer
split horizon DNS
deny by default
firewalls
15. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
ping of death
twisted pair
split horizon DNS
proxy server
16. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
port address translation
ARP
repeater
switch
17. Twisted pair cable with speed capability of 10Mbps
session hijacking
dual homed
cat3
switch
18. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
cat5
DoS attacks
man in the middle and replay
10Base5
19. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
application
broadcast domain
10base2
hub
20. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
IP spoofing
defense in depth
NAT
port address translation
21. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
IP spoofing
1024 - 49 -151
dual homed
session hijacking
22. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
ARP
informed
proxy
repeater
23. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
screened subnet
spoofing attacks
store and forward
49 -152 - 65 -535
24. Connects devices together to form a subnet - broadcasts incoming packets to all devices
NAT
port address translation
cat5
hub
25. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
deny by default
subnet
firewalls
informed
26. A complete transfer of all DNS zone information from one server to another
DNS spoofing
behavior based
zone transfer
fiber optic
27. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
DoS attacks
VLAN
teardrop
NIPS
28. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
false negative
NIDS network connections
fiber optic
DMZ
29. Man in the middle attack where the content of an intercepted message is altered before it is sent on
active
10base2
replay
network
30. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
twisted pair
DNS spoofing
router
stateful inspection
31. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
man in the middle
deny by default
packet filter
hub
32. IP spoofing attack where the attacker can only send packets and has to guess about replies
firewalls
blind
multi homed
private
33. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
risk mitigation
NIDS network connections
allow by default
IP spoofing
34. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
49 -152 - 65 -535
zone transfer
honeypot
private
35. Allows all traffic except traffic that is specifically denied - also known as permissive access
allow by default
honeynet
null session
ARP
36. A server that sits between an intranet and it's Internet connection - masking all IP addresses
proxy server
passive
PBX (Private Branch Exchange)
10base2
37. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
static NAT
active
tcp/ip hijacking
switch
38. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
IP spoofing
honeypot
zone transfer
port address translation
39. Twisted pair cable with speed capability of 1Gbps
encrypt session key
multi homed
cat5
HIDS
40. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
null session
broadcast domain
dual homed
layered
41. Amplifies the signal of incoming packets before broadcasting them to the network
repeater
stateful inspection
application gateway
proxy
42. Collection on honeypots
1024 - 49 -151
fraggle
honeynet
0 - 1023
43. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
risk mitigation
multiple interface firewall
encrypt session key
firewalls
44. User / registered ports
1024 - 49 -151
SYN flood
store and forward
source - destination - protocol
45. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
NIDS
network
firewall architectures
null session
46. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
DNS spoofing
stateful inspection
IP spoofing
null session
47. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
smurf
false negative
screened subnet
screened host
48. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
teardrop
NIDS
screened host
null session
49. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
network
0 - 1023
session hijacking
VLAN
50. Forging an IP address with the address of a trusted host
IP spoofing
broadcast domain
NIPS
replay