SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
broadcast domain
HIDS
ping of death
active
2. Head of a packet contains...
SYN flood
IP spoofing
source - destination - protocol
proxy
3. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
allow by default
cat5
ARP poisoning
honeypot
4. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
proxy server
fraggle
content filter
man in the middle and replay
5. Dynamic / private ports
49 -152 - 65 -535
port address translation
DNS spoofing
protocol analyzer
6. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
broadcast domain
firewalls
teardrop
dynamic NAT
7. Known as thicknet - 10mbps - limited to 500 meters
multi homed
promiscuous
ping of death
10Base5
8. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
49 -152 - 65 -535
bastion host
false positive
deny by default
9. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
source - destination - protocol
informed
firewalls
application gateway
10. Packet filtering - proxies - stateful inspection
firewalls
screened host
spoofing
false negative
11. A variation of a smurf attack using UDP
broadcast domain
fraggle
VLAN
twisted pair
12. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
risk mitigation
NIDS
deny by default
informed
13. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
firewall architectures
null session
NAT
dynamic NAT
14. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
risk mitigation
bastion host
store and forward
false negative
15. Twisted pair cable with speed capability of 10Mbps
NIPS
cat3
honeypot
allow by default
16. A logical connection point allowing computers and software to communicate and exchange data
broadcast domain
port
active
honeynet
17. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
blind
IP spoofing
null session
passive
18. Evolved from IDS - monitors network traffic - detects and responds to attack on network
NIPS
teardrop
packet filter
website spoofing
19. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
session hijacking
dual homed
ping flooding
false negative
20. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
proxy server
defense in depth
ping of death
broadcast domain
21. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
1024 - 49 -151
router
bastion host
SYN flood
22. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
man in the middle and replay
hub
screened host
source - destination - protocol
23. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
fiber optic
SYN flood
spoofing
fraggle
24. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
twisted pair
proxy
website spoofing
passive
25. Level 2 firewall often used to filter web traffic
deny by default
fiber optic
teardrop
proxy
26. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
cat3
coaxial
dynamic NAT
man in the middle
27. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
ping of death
application gateway
coaxial
28. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
behavior based
49 -152 - 65 -535
NIDS
twisted pair
29. A sniffer mode used to capture traffic addressed to/from another machine on the network
false positive
promiscuous
spoofing attacks
active
30. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
allow by default
49 -152 - 65 -535
subnet
packet filter
31. Protocol used to map an known IP address to its corresponding media access control (MAC) address
smurf
ARP
IP spoofing
dual homed
32. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
switch
fiber optic
dynamic NAT
honeypot
33. Connects devices together to form a subnet - broadcasts incoming packets to all devices
behavior based
cat3
1024 - 49 -151
hub
34. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
NIDS
smurf
deny by default
firewalls
35. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
store and forward
promiscuous
NAT
NIDS
36. An attacker redirects traffic by falsifying the IP address requested by ARP request
encrypt session key
firewalls
ARP poisoning
10Base5
37. Bbenign activity reported as malicious
false positive
ping flooding
session hijacking
packet filter
38. Network configuration that permits selected outsiders access internal information systems
extranet
ping flooding
proxy
ARP poisoning
39. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
false negative
session hijacking
spoofing
stateful inspection
40. Used to pass data from one VLAN to another
IP spoofing
ping of death
router
honeypot
41. IP spoofing attack where the attacker can only send packets and has to guess about replies
passive
bastion host
teardrop
blind
42. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
man in the middle
PBX (Private Branch Exchange)
active
IP spoofing
43. Session hijacking countermeasure
store and forward
dynamic NAT
encrypt session key
repeater
44. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
repeater
layered
screened host
replay
45. A server that sits between an intranet and it's Internet connection - masking all IP addresses
network
NIPS
honeynet
proxy server
46. Malicious activity not reported or detected
spoofing
passive
false negative
website spoofing
47. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
proxy
dual homed
tcp/ip hijacking
0 - 1023
48. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
NIDS
defense in depth
VLAN
firewalls
49. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
null session
switch
land attack
passive
50. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
0 - 1023
subnet
store and forward
man in the middle