SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IP spoofing attack where the attacker can only send packets and has to guess about replies
false positive
blind
NAT
promiscuous
2. Monitors network traffic to identify possible attacks
NIDS
ARP poisoning
fiber optic
NIDS network connections
3. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
cat5
fiber optic
teardrop
website spoofing
4. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
source - destination - protocol
10Base5
dynamic NAT
teardrop
5. A variation of a smurf attack using UDP
man in the middle and replay
fraggle
port address translation
HIDS
6. Twisted pair cable with speed capability of 10Mbps
firewalls
behavior based
cat3
firewall architectures
7. A physical or logical subnetwork that houses systems accessible to a larger untrusted network - usually the Internet - also known as DMZ
proxy
ARP
spoofing
screened subnet
8. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
NIDS
49 -152 - 65 -535
port address translation
null session
9. Examines a entire packet and determines action based on a complex set of rules
application gateway
smurf
content filter
repeater
10. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
repeater
stateful inspection
active
null session
11. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
dual homed
encrypt session key
broadcast domain
IP spoofing
12. Level 2 firewall often used to filter web traffic
screened subnet
proxy
cat3
NIPS
13. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
man in the middle
spoofing
dynamic NAT
NAT
14. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
firewall architectures
subnet
DNS spoofing
extranet
15. Allows all traffic except traffic that is specifically denied - also known as permissive access
content filter
allow by default
NAT
deny by default
16. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
man in the middle and replay
teardrop
behavior based
false positive
17. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
ARP
website spoofing
layered
NIPS
18. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
null session
49 -152 - 65 -535
DNS spoofing
stateful inspection
19. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
static NAT
firewall architectures
man in the middle and replay
proxy server
20. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
ping of death
hub
broadcast domain
screened subnet
21. Known as thinnet - 10mbps - limited to 185 meters
defense in depth
false negative
informed
10base2
22. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
twisted pair
multi homed
split horizon DNS
false negative
23. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
broadcast domain
10base2
false positive
router
24. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
DoS attacks
content filter
port
dual homed
25. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
honeypot
network
twisted pair
NIDS
26. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
replay
NIPS
fiber optic
ARP poisoning
27. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
dynamic NAT
SYN flood
10base2
28. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
stateful inspection
VLAN
informed
firewalls
29. Head of a packet contains...
dynamic NAT
1024 - 49 -151
honeynet
source - destination - protocol
30. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
private
coaxial
application
risk mitigation
31. Malicious activity not reported or detected
DNS spoofing
false negative
DMZ
man in the middle and replay
32. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
firewalls
passive
protocol
session hijacking
33. Forging an IP address with the address of a trusted host
coaxial
IP spoofing
protocol
spoofing
34. Connects devices together to form a subnet - packet forwarding is based on MAC addresses - works at the data link layer of the OSI
NIDS
0 - 1023
switch
false negative
35. Protocol used to map an known IP address to its corresponding media access control (MAC) address
layered
passive
ARP
dual homed
36. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
NIDS network connections
screened host
HIDS
source - destination - protocol
37. Bbenign activity reported as malicious
DNS spoofing
false positive
screened subnet
teardrop
38. User / registered ports
DNS spoofing
active
1024 - 49 -151
HIDS
39. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
spoofing attacks
risk mitigation
private
port address translation
40. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
HIDS
stateful inspection
IP spoofing
NIDS
41. Network configuration that permits selected outsiders access internal information systems
extranet
private
port
application gateway
42. Collection on honeypots
honeynet
firewall architectures
10Base5
honeypot
43. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
spoofing attacks
switch
smurf
content filter
44. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
smurf
tcp/ip hijacking
ping of death
risk mitigation
45. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
stateful inspection
deny by default
protocol
man in the middle and replay
46. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
content filter
application gateway
application
session hijacking
47. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
allow by default
spoofing
ping of death
IP spoofing
48. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
layered
application
bastion host
packet filter
49. Packet filtering - proxies - stateful inspection
firewalls
NIDS network connections
bastion host
PBX (Private Branch Exchange)
50. A sniffer mode used to capture traffic addressed to/from another machine on the network
cat5
IP spoofing
multiple interface firewall
promiscuous