SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
deny by default
multi homed
packet filter
source - destination - protocol
2. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
false negative
behavior based
SYN flood
man in the middle and replay
3. Twisted pair cable with speed capability of 10Mbps
fraggle
49 -152 - 65 -535
IP spoofing
cat3
4. Known as thinnet - 10mbps - limited to 185 meters
DMZ
10base2
behavior based
VLAN
5. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
application gateway
application
encrypt session key
6. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
twisted pair
active
DoS attacks
replay
7. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
passive
PBX (Private Branch Exchange)
broadcast domain
NIDS network connections
8. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
DNS spoofing
router
NIDS
0 - 1023
9. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
spoofing
man in the middle
PBX (Private Branch Exchange)
network
10. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
smurf
land attack
honeynet
IP spoofing
11. Head of a packet contains...
deny by default
honeynet
subnet
source - destination - protocol
12. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
static NAT
10Base5
dual homed
behavior based
13. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
ARP
defense in depth
bastion host
hub
14. Twisted pair cable with speed capability of 1Gbps
content filter
cat5
source - destination - protocol
port
15. Firewall with several NICs connected to different networks
bastion host
multi homed
false negative
replay
16. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
behavior based
honeynet
layered
screened host
17. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
PBX (Private Branch Exchange)
proxy
DMZ
coaxial
18. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
store and forward
split horizon DNS
honeypot
stateful inspection
19. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
honeynet
DNS spoofing
tcp/ip hijacking
VLAN
20. Collection on honeypots
deny by default
extranet
encrypt session key
honeynet
21. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
null session
IP spoofing
layered
22. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
ping flooding
man in the middle
router
subnet
23. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
informed
10base2
store and forward
port address translation
24. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
static NAT
switch
10base2
teardrop
25. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
null session
router
replay
smurf
26. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
switch
10Base5
content filter
multi homed
27. IPS response method - terminate process/session - block/reject and redirect network traffic
SYN flood
active
port
spoofing attacks
28. IP spoofing attack where the attacker can only send packets and has to guess about replies
blind
knowledge based
HIDS
49 -152 - 65 -535
29. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
fiber optic
knowledge based
session hijacking
twisted pair
30. Examines a entire packet and determines action based on a complex set of rules
application gateway
encrypt session key
router
multiple interface firewall
31. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
repeater
switch
DNS spoofing
passive
32. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
null session
session hijacking
IP spoofing
49 -152 - 65 -535
33. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
IP spoofing
private
dual homed
49 -152 - 65 -535
34. Evolved from IDS - monitors network traffic - detects and responds to attack on network
cat5
NIPS
active
IP spoofing
35. An attacker redirects traffic by falsifying the IP address requested by ARP request
ARP poisoning
active
encrypt session key
store and forward
36. Monitors network traffic to identify possible attacks
cat5
content filter
website spoofing
NIDS
37. Acts as an organizations internal phone system
blind
SYN flood
DNS spoofing
PBX (Private Branch Exchange)
38. Level 2 firewall often used to filter web traffic
man in the middle
proxy
ping flooding
packet filter
39. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
SYN flood
proxy server
cat5
10Base5
40. Dynamic / private ports
behavior based
49 -152 - 65 -535
active
content filter
41. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
promiscuous
HIDS
stateful inspection
application gateway
42. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
coaxial
false negative
content filter
spoofing
43. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
firewalls
NAT
proxy
application gateway
44. Attempt to block service or reduce activity by overloading the victim machine with ping requests
replay
twisted pair
ping flooding
extranet
45. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
smurf
split horizon DNS
VLAN
website spoofing
46. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
tcp/ip hijacking
man in the middle and replay
screened host
cat5
47. Amplifies the signal of incoming packets before broadcasting them to the network
repeater
port
NAT
knowledge based
48. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
DNS spoofing
split horizon DNS
risk mitigation
49. IDS response method using logging and notification
fraggle
risk mitigation
passive
zone transfer
50. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
proxy
store and forward
risk mitigation
screened host
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests