SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
man in the middle and replay
screened host
10base2
NIDS network connections
2. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
broadcast domain
content filter
protocol
repeater
3. Amplifies the signal of incoming packets before broadcasting them to the network
honeypot
ARP poisoning
land attack
repeater
4. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
broadcast domain
protocol analyzer
DNS spoofing
deny by default
5. User / registered ports
static NAT
1024 - 49 -151
firewall architectures
active
6. Used to pass data from one VLAN to another
screened host
informed
router
null session
7. Protocol used to map an known IP address to its corresponding media access control (MAC) address
source - destination - protocol
ARP
10Base5
static NAT
8. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
repeater
smurf
port address translation
ping flooding
9. Acts as an organizations internal phone system
IP spoofing
PBX (Private Branch Exchange)
VLAN
promiscuous
10. Bbenign activity reported as malicious
PBX (Private Branch Exchange)
port
passive
false positive
11. IDS that relies on the identification of known attack signatures
hub
knowledge based
DoS attacks
private
12. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
NIPS
content filter
spoofing
firewall architectures
13. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
behavior based
multiple interface firewall
application gateway
ping of death
14. One private IP address is mapped to one public IP address
static NAT
stateful inspection
port address translation
active
15. A variation of a smurf attack using UDP
firewall architectures
cat3
fraggle
extranet
16. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
ARP poisoning
screened host
ARP
honeypot
17. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
null session
honeypot
NIDS network connections
IP spoofing
18. Twisted pair cable with speed capability of 1Gbps
application
cat5
switch
behavior based
19. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
packet filter
smurf
content filter
switch
20. A logical connection point allowing computers and software to communicate and exchange data
screened host
zone transfer
firewalls
port
21. IP spoofing attack where the attacker can only send packets and has to guess about replies
bastion host
blind
ARP
layered
22. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
false positive
VLAN
cat3
split horizon DNS
23. Connects devices together to form a subnet - broadcasts incoming packets to all devices
risk mitigation
active
NAT
hub
24. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
proxy
IP spoofing
bastion host
screened host
25. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
replay
firewall architectures
informed
10Base5
26. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
defense in depth
screened subnet
application
firewalls
27. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
1024 - 49 -151
NAT
null session
active
28. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
application
hub
subnet
router
29. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
extranet
application gateway
website spoofing
ping flooding
30. IDS response method using logging and notification
passive
subnet
NIPS
land attack
31. Packet filtering - proxies - stateful inspection
firewalls
49 -152 - 65 -535
packet filter
dynamic NAT
32. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
store and forward
tcp/ip hijacking
DNS spoofing
packet filter
33. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
informed
layered
deny by default
passive
34. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
multiple interface firewall
IP spoofing
bastion host
router
35. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
fiber optic
false positive
subnet
split horizon DNS
36. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
replay
proxy
man in the middle
proxy
37. IP - email - website - DNS - and ARP
1024 - 49 -151
spoofing attacks
IP spoofing
layered
38. Firewall with several NICs connected to different networks
multi homed
subnet
replay
IP spoofing
39. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
passive
null session
behavior based
NIDS
40. Head of a packet contains...
replay
hub
application gateway
source - destination - protocol
41. Collection on honeypots
NIPS
split horizon DNS
1024 - 49 -151
honeynet
42. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
land attack
DMZ
IP spoofing
stateful inspection
43. A complete transfer of all DNS zone information from one server to another
IP spoofing
screened host
NIDS
zone transfer
44. An attacker redirects traffic by falsifying the IP address requested by ARP request
application
passive
ARP poisoning
active
45. An application layer gateway works at this layer of the OSI model
application
private
firewalls
allow by default
46. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
multiple interface firewall
session hijacking
firewalls
defense in depth
47. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
1024 - 49 -151
risk mitigation
protocol
repeater
48. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
dual homed
teardrop
HIDS
10base2
49. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
protocol analyzer
stateful inspection
encrypt session key
ping flooding
50. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
session hijacking
49 -152 - 65 -535
null session
DMZ