SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Session hijacking countermeasure
ARP poisoning
NIDS network connections
encrypt session key
promiscuous
2. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
man in the middle and replay
extranet
store and forward
proxy
3. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
layered
VLAN
spoofing
cat5
4. Acts as an organizations internal phone system
screened subnet
HIDS
NIPS
PBX (Private Branch Exchange)
5. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
49 -152 - 65 -535
PBX (Private Branch Exchange)
teardrop
fiber optic
6. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
SYN flood
man in the middle and replay
router
blind
7. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
null session
encrypt session key
proxy
router
8. Known as thinnet - 10mbps - limited to 185 meters
promiscuous
teardrop
10base2
dynamic NAT
9. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
DNS spoofing
subnet
protocol analyzer
hub
10. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
man in the middle
DNS spoofing
cat5
informed
11. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
NIDS network connections
stateful inspection
content filter
source - destination - protocol
12. A complete transfer of all DNS zone information from one server to another
layered
packet filter
broadcast domain
zone transfer
13. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
screened host
port
false positive
0 - 1023
14. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
content filter
null session
dual homed
encrypt session key
15. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
0 - 1023
NIDS network connections
false negative
IP spoofing
16. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
screened host
DMZ
PBX (Private Branch Exchange)
null session
17. A packet filtering firewall works at this layer of the OSI model
network
proxy server
deny by default
DMZ
18. Dynamic / private ports
packet filter
firewall architectures
NIDS network connections
49 -152 - 65 -535
19. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
ARP
deny by default
proxy
false positive
20. A variation of a smurf attack using UDP
firewalls
fraggle
content filter
store and forward
21. Connects devices together to form a subnet - broadcasts incoming packets to all devices
honeypot
twisted pair
NAT
hub
22. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
screened subnet
honeypot
router
broadcast domain
23. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
honeypot
informed
broadcast domain
stateful inspection
24. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
SYN flood
informed
1024 - 49 -151
deny by default
25. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
dual homed
NAT
passive
ping flooding
26. IP - email - website - DNS - and ARP
spoofing attacks
1024 - 49 -151
encrypt session key
private
27. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
packet filter
IP spoofing
49 -152 - 65 -535
active
28. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
49 -152 - 65 -535
informed
spoofing attacks
bastion host
29. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
static NAT
HIDS
split horizon DNS
ARP
30. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
fiber optic
replay
DoS attacks
session hijacking
31. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
zone transfer
broadcast domain
screened host
stateful inspection
32. Attempt to block service or reduce activity by overloading the victim machine with ping requests
coaxial
port
ping flooding
port address translation
33. Firewall with several NICs connected to different networks
PBX (Private Branch Exchange)
active
tcp/ip hijacking
multi homed
34. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
defense in depth
cat5
bastion host
private
35. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
website spoofing
private
twisted pair
network
36. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
passive
router
HIDS
behavior based
37. IPS response method - terminate process/session - block/reject and redirect network traffic
null session
behavior based
spoofing attacks
active
38. A logical connection point allowing computers and software to communicate and exchange data
null session
port
repeater
10Base5
39. Level 2 firewall often used to filter web traffic
broadcast domain
proxy server
1024 - 49 -151
proxy
40. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
man in the middle
port
stateful inspection
spoofing attacks
41. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
source - destination - protocol
network
false negative
session hijacking
42. An application layer gateway works at this layer of the OSI model
0 - 1023
NIDS
application
behavior based
43. IP spoofing attack where the attacker can only send packets and has to guess about replies
blind
zone transfer
proxy
land attack
44. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
stateful inspection
passive
switch
man in the middle and replay
45. A set of rules computers use to communicate with each other across a network
ping of death
risk mitigation
protocol
spoofing
46. Used to pass data from one VLAN to another
router
HIDS
coaxial
dynamic NAT
47. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
firewall architectures
10base2
port address translation
1024 - 49 -151
48. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
NIPS
stateful inspection
honeypot
private
49. Collection on honeypots
informed
deny by default
honeynet
HIDS
50. Examines a entire packet and determines action based on a complex set of rules
extranet
DMZ
application gateway
router