SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
passive
port
fraggle
content filter
2. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
PBX (Private Branch Exchange)
honeypot
multiple interface firewall
zone transfer
3. Used to pass data from one VLAN to another
port address translation
router
active
NIDS
4. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
layered
source - destination - protocol
ARP poisoning
zone transfer
5. Attempt to block service or reduce activity by overloading the victim machine with ping requests
port
ping flooding
passive
allow by default
6. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
ping of death
store and forward
content filter
informed
7. A complete transfer of all DNS zone information from one server to another
firewalls
protocol analyzer
land attack
zone transfer
8. Twisted pair cable with speed capability of 10Mbps
spoofing attacks
fraggle
cat3
false negative
9. IDS response method using logging and notification
twisted pair
HIDS
blind
passive
10. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
session hijacking
firewalls
VLAN
fiber optic
11. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
port address translation
man in the middle
spoofing
passive
12. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
switch
SYN flood
ARP poisoning
honeypot
13. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
teardrop
screened subnet
store and forward
packet filter
14. Multiple network defense components are placed throughout the organizations assets and the network is properly segmented
honeynet
packet filter
multiple interface firewall
defense in depth
15. IP - email - website - DNS - and ARP
VLAN
spoofing attacks
passive
packet filter
16. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
split horizon DNS
stateful inspection
PBX (Private Branch Exchange)
IP spoofing
17. A pool of public IP addresses is shared by a collection of private IP addresses
active
repeater
dynamic NAT
static NAT
18. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
NIDS network connections
twisted pair
store and forward
fraggle
19. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
DMZ
ping of death
active
static NAT
20. One private IP address is mapped to one public IP address
cat3
ARP
promiscuous
static NAT
21. Collection on honeypots
honeynet
router
man in the middle and replay
ping flooding
22. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
false positive
spoofing attacks
firewalls
website spoofing
23. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
defense in depth
router
PBX (Private Branch Exchange)
port address translation
24. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
VLAN
dual homed
network
session hijacking
25. Known as thicknet - 10mbps - limited to 500 meters
website spoofing
10Base5
spoofing attacks
packet filter
26. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
protocol
land attack
fiber optic
NAT
27. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
ARP
VLAN
allow by default
coaxial
28. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
0 - 1023
man in the middle
DoS attacks
twisted pair
29. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
passive
broadcast domain
proxy
DMZ
30. Dynamic / private ports
49 -152 - 65 -535
hub
screened subnet
replay
31. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
honeypot
encrypt session key
firewall architectures
port address translation
32. Known as thinnet - 10mbps - limited to 185 meters
protocol analyzer
screened subnet
proxy
10base2
33. Head of a packet contains...
switch
DMZ
source - destination - protocol
static NAT
34. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
ARP poisoning
proxy
IP spoofing
content filter
35. A variation of a smurf attack using UDP
screened host
twisted pair
IP spoofing
fraggle
36. Connects devices together to form a subnet - broadcasts incoming packets to all devices
DMZ
hub
active
multi homed
37. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
subnet
firewalls
multi homed
38. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
HIDS
NIPS
risk mitigation
dual homed
39. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
IP spoofing
twisted pair
hub
1024 - 49 -151
40. Monitors network traffic to identify possible attacks
man in the middle and replay
application gateway
NIDS
10Base5
41. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
repeater
defense in depth
man in the middle
1024 - 49 -151
42. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
man in the middle and replay
blind
proxy
43. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
allow by default
ARP poisoning
screened host
10base2
44. Web servers - FTP servers - DNS servers - mail servers should be located on the _____________
network
DMZ
spoofing
ARP
45. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
stateful inspection
NIPS
informed
risk mitigation
46. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
DNS spoofing
HIDS
bastion host
active
47. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
cat3
teardrop
DoS attacks
coaxial
48. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
land attack
multiple interface firewall
switch
risk mitigation
49. Firewall with several NICs connected to different networks
fiber optic
multi homed
layered
screened subnet
50. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
SYN flood
router
49 -152 - 65 -535
smurf