SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Forging an IP address with the address of a trusted host
protocol analyzer
broadcast domain
IP spoofing
spoofing attacks
2. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
bastion host
active
IP spoofing
coaxial
3. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
behavior based
spoofing
DMZ
SYN flood
4. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
website spoofing
NIDS
static NAT
NIDS
5. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
tcp/ip hijacking
ARP
stateful inspection
extranet
6. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
firewall architectures
1024 - 49 -151
protocol
7. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
cat3
false negative
split horizon DNS
0 - 1023
8. Network configuration that permits selected outsiders access internal information systems
switch
honeypot
extranet
ping flooding
9. Level 2 firewall often used to filter web traffic
replay
layered
informed
proxy
10. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
fiber optic
port address translation
firewalls
proxy
11. Known as thinnet - 10mbps - limited to 185 meters
cat5
blind
10base2
zone transfer
12. Head of a packet contains...
source - destination - protocol
SYN flood
encrypt session key
switch
13. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
session hijacking
coaxial
packet filter
DNS spoofing
14. User / registered ports
defense in depth
deny by default
fraggle
1024 - 49 -151
15. Connects devices together to form a subnet - broadcasts incoming packets to all devices
hub
man in the middle and replay
replay
IP spoofing
16. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
stateful inspection
risk mitigation
broadcast domain
NAT
17. Acts as an organizations internal phone system
PBX (Private Branch Exchange)
informed
teardrop
risk mitigation
18. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
teardrop
port address translation
ping flooding
coaxial
19. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
packet filter
NIPS
firewalls
NIDS
20. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
subnet
application
null session
10base2
21. Attempt to block service or reduce activity by overloading the victim machine with ping requests
NIDS
null session
ping flooding
HIDS
22. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
repeater
49 -152 - 65 -535
defense in depth
port address translation
23. IP spoofing attack where the attacker can only send packets and has to guess about replies
firewalls
49 -152 - 65 -535
blind
NIDS
24. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
false positive
broadcast domain
null session
zone transfer
25. Packet filtering - proxies - stateful inspection
firewalls
risk mitigation
firewall architectures
website spoofing
26. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
protocol
NIDS
screened subnet
router
27. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
promiscuous
stateful inspection
blind
fiber optic
28. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
SYN flood
stateful inspection
coaxial
null session
29. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
promiscuous
firewalls
HIDS
spoofing
30. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
router
session hijacking
screened host
NAT
31. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
null session
screened subnet
smurf
land attack
32. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
honeypot
active
twisted pair
10base2
33. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
firewalls
defense in depth
IP spoofing
content filter
34. A complete transfer of all DNS zone information from one server to another
router
protocol
zone transfer
fiber optic
35. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
layered
source - destination - protocol
man in the middle and replay
firewalls
36. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
store and forward
49 -152 - 65 -535
broadcast domain
IP spoofing
37. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
informed
ARP
website spoofing
false positive
38. Collection on honeypots
deny by default
firewalls
NIDS network connections
honeynet
39. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
smurf
NIDS network connections
firewall architectures
spoofing attacks
40. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
layered
null session
dynamic NAT
41. Allows all traffic except traffic that is specifically denied - also known as permissive access
proxy
honeynet
proxy server
allow by default
42. Dynamic / private ports
broadcast domain
active
49 -152 - 65 -535
honeynet
43. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
honeypot
router
10Base5
44. An attacker redirects traffic by falsifying the IP address requested by ARP request
ARP poisoning
router
1024 - 49 -151
spoofing attacks
45. A ping message is broadcast to an entire network with a spoofed source IP addess of the victim computer - flooding the victim computer with responses during this attack
smurf
NIDS
screened host
coaxial
46. A server that sits between an intranet and it's Internet connection - masking all IP addresses
hub
proxy server
active
packet filter
47. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
source - destination - protocol
port address translation
bastion host
broadcast domain
48. A sniffer mode used to capture traffic addressed to/from another machine on the network
hub
port
man in the middle and replay
promiscuous
49. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
deny by default
49 -152 - 65 -535
split horizon DNS
proxy
50. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
NIDS
knowledge based
protocol
twisted pair
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests