SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Connects devices together to form a subnet - broadcasts incoming packets to all devices
dynamic NAT
ping of death
hub
session hijacking
2. Acts as an organizations internal phone system
blind
PBX (Private Branch Exchange)
NIDS
fraggle
3. Man in the middle attack where the content of an intercepted message is altered before it is sent on
active
NIDS
application gateway
stateful inspection
4. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
twisted pair
informed
multiple interface firewall
DoS attacks
5. Packet filtering - proxies - stateful inspection
firewalls
application gateway
switch
cat3
6. Monitors network traffic to identify possible attacks
network
NIDS
dual homed
encrypt session key
7. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
knowledge based
behavior based
honeypot
promiscuous
8. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
split horizon DNS
DoS attacks
website spoofing
VLAN
9. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
split horizon DNS
content filter
defense in depth
10base2
10. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
cat5
router
risk mitigation
deny by default
11. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
port address translation
honeypot
promiscuous
man in the middle
12. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
store and forward
session hijacking
man in the middle
fraggle
13. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
dynamic NAT
stateful inspection
active
PBX (Private Branch Exchange)
14. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
proxy
NAT
10Base5
15. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
0 - 1023
firewall architectures
active
port address translation
16. Attempt to block service or reduce activity by overloading the victim machine with ping requests
ping flooding
private
smurf
knowledge based
17. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
bastion host
static NAT
honeypot
HIDS
18. An attacker redirects traffic by falsifying the IP address requested by ARP request
NIDS
VLAN
49 -152 - 65 -535
ARP poisoning
19. Allows all traffic except traffic that is specifically denied - also known as permissive access
multiple interface firewall
allow by default
10Base5
smurf
20. IP - email - website - DNS - and ARP
dual homed
man in the middle and replay
spoofing attacks
firewall architectures
21. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
informed
NIDS
NIPS
layered
22. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
NIPS
stateful inspection
website spoofing
PBX (Private Branch Exchange)
23. A server that sits between an intranet and it's Internet connection - masking all IP addresses
protocol analyzer
proxy server
ping flooding
screened host
24. Malicious activity not reported or detected
network
switch
dual homed
false negative
25. A variation of a smurf attack using UDP
active
smurf
hub
fraggle
26. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
NAT
DMZ
active
defense in depth
27. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
risk mitigation
zone transfer
defense in depth
packet filter
28. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
static NAT
dual homed
cat3
DoS attacks
29. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
cat5
NIPS
NAT
firewalls
30. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
SYN flood
1024 - 49 -151
promiscuous
passive
31. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
repeater
man in the middle and replay
ARP
defense in depth
32. Examines a entire packet and determines action based on a complex set of rules
ping flooding
null session
application gateway
knowledge based
33. Twisted pair cable with speed capability of 1Gbps
router
encrypt session key
fraggle
cat5
34. One private IP address is mapped to one public IP address
source - destination - protocol
router
static NAT
null session
35. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
network
smurf
router
firewalls
36. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
coaxial
false positive
cat3
packet filter
37. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
stateful inspection
passive
application
NIDS network connections
38. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
firewalls
IP spoofing
cat3
fraggle
39. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
dynamic NAT
risk mitigation
firewalls
cat5
40. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
store and forward
blind
layered
null session
41. Level 2 firewall often used to filter web traffic
teardrop
router
fiber optic
proxy
42. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
NIDS
spoofing
teardrop
IP spoofing
43. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
broadcast domain
informed
screened host
IP spoofing
44. Used to pass data from one VLAN to another
IP spoofing
active
cat5
router
45. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
port
cat3
PBX (Private Branch Exchange)
private
46. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
network
null session
cat5
proxy
47. IP spoofing attack where the attacker can only send packets and has to guess about replies
false negative
blind
allow by default
port address translation
48. Known as thicknet - 10mbps - limited to 500 meters
blind
store and forward
1024 - 49 -151
10Base5
49. Forging an IP address with the address of a trusted host
ARP
0 - 1023
IP spoofing
man in the middle and replay
50. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
IP spoofing
0 - 1023
fiber optic
NIPS