SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
active
dual homed
NAT
application
2. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
repeater
ping flooding
honeypot
3. IPS response method - terminate process/session - block/reject and redirect network traffic
PBX (Private Branch Exchange)
informed
active
SYN flood
4. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
session hijacking
10Base5
IP spoofing
stateful inspection
5. Known as thicknet - 10mbps - limited to 500 meters
dual homed
repeater
tcp/ip hijacking
10Base5
6. Head of a packet contains...
source - destination - protocol
ARP
bastion host
static NAT
7. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
multi homed
NIDS network connections
null session
fiber optic
8. Collection on honeypots
coaxial
website spoofing
honeynet
HIDS
9. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
VLAN
firewall architectures
teardrop
zone transfer
10. Attempt to block service or reduce activity by overloading the victim machine with ping requests
multi homed
ping flooding
ping of death
risk mitigation
11. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
network
promiscuous
dynamic NAT
smurf
12. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
protocol analyzer
honeynet
IP spoofing
13. An attacker redirects traffic by falsifying the IP address requested by ARP request
subnet
ARP poisoning
session hijacking
DNS spoofing
14. Bbenign activity reported as malicious
ping flooding
false positive
passive
NIDS
15. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
firewalls
SYN flood
passive
HIDS
16. User / registered ports
active
HIDS
1024 - 49 -151
man in the middle and replay
17. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
screened subnet
router
active
SYN flood
18. Known as thinnet - 10mbps - limited to 185 meters
VLAN
firewalls
multiple interface firewall
10base2
19. A sniffer mode used to capture traffic addressed to/from another machine on the network
behavior based
fraggle
active
promiscuous
20. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
allow by default
stateful inspection
active
spoofing
21. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
fraggle
DMZ
cat5
teardrop
22. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
passive
behavior based
teardrop
DoS attacks
23. IDS response method using logging and notification
IP spoofing
fiber optic
proxy server
passive
24. Allows all traffic except traffic that is specifically denied - also known as permissive access
promiscuous
allow by default
protocol analyzer
bastion host
25. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
ARP
multiple interface firewall
port address translation
content filter
26. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
screened host
repeater
knowledge based
defense in depth
27. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
SYN flood
ARP
proxy
ping of death
28. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
NIDS network connections
extranet
smurf
port address translation
29. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
cat3
screened subnet
replay
split horizon DNS
30. IP - email - website - DNS - and ARP
private
spoofing attacks
multiple interface firewall
fraggle
31. Amplifies the signal of incoming packets before broadcasting them to the network
active
repeater
IP spoofing
honeynet
32. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
honeypot
1024 - 49 -151
firewalls
NAT
33. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
extranet
encrypt session key
broadcast domain
router
34. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
stateful inspection
49 -152 - 65 -535
layered
cat5
35. IDS that relies on the identification of known attack signatures
SYN flood
ARP poisoning
knowledge based
content filter
36. One private IP address is mapped to one public IP address
fraggle
static NAT
promiscuous
application
37. Protocol used to map an known IP address to its corresponding media access control (MAC) address
session hijacking
ARP
dual homed
subnet
38. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
informed
proxy
passive
spoofing attacks
39. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
SYN flood
bastion host
protocol
application
40. Malicious activity not reported or detected
false negative
cat5
screened subnet
bastion host
41. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
IP spoofing
DoS attacks
cat5
protocol
42. IP spoofing attack where the attacker can only send packets and has to guess about replies
blind
ping of death
man in the middle
encrypt session key
43. A packet filtering firewall works at this layer of the OSI model
network
store and forward
NIPS
land attack
44. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
blind
split horizon DNS
NIDS network connections
switch
45. Firewall with several NICs connected to different networks
ARP poisoning
session hijacking
store and forward
multi homed
46. Man in the middle attack where the content of an intercepted message is altered before it is sent on
ARP poisoning
active
port
HIDS
47. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
false negative
DMZ
IP spoofing
packet filter
48. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
firewalls
bastion host
layered
null session
49. Session hijacking countermeasure
port address translation
encrypt session key
DoS attacks
extranet
50. A set of rules computers use to communicate with each other across a network
stateful inspection
twisted pair
protocol
stateful inspection