SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
twisted pair
stateful inspection
informed
IP spoofing
2. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
proxy
null session
ping of death
packet filter
3. Monitors network traffic to identify possible attacks
screened host
NIDS
split horizon DNS
blind
4. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
spoofing
switch
dual homed
1024 - 49 -151
5. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
10base2
DoS attacks
encrypt session key
broadcast domain
6. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
extranet
tcp/ip hijacking
1024 - 49 -151
packet filter
7. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
SYN flood
packet filter
man in the middle and replay
man in the middle
8. Dynamic / private ports
spoofing
0 - 1023
49 -152 - 65 -535
switch
9. Known as thinnet - 10mbps - limited to 185 meters
10base2
stateful inspection
ARP poisoning
repeater
10. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
router
protocol analyzer
10Base5
PBX (Private Branch Exchange)
11. Acts as an organizations internal phone system
cat5
defense in depth
PBX (Private Branch Exchange)
promiscuous
12. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
screened host
defense in depth
cat3
source - destination - protocol
13. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
DMZ
IP spoofing
spoofing attacks
dynamic NAT
14. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
firewall architectures
screened host
router
content filter
15. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
stateful inspection
protocol analyzer
layered
spoofing
16. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
active
DoS attacks
null session
port address translation
17. A server that sits between an intranet and it's Internet connection - masking all IP addresses
risk mitigation
passive
proxy server
DMZ
18. A sniffer mode used to capture traffic addressed to/from another machine on the network
session hijacking
screened subnet
split horizon DNS
promiscuous
19. IDS that relies on the identification of known attack signatures
spoofing attacks
promiscuous
knowledge based
land attack
20. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
proxy
spoofing
static NAT
firewalls
21. Seeks to reduce the probability and/or impact of a specific risk below an acceptable threshold
risk mitigation
firewalls
router
SYN flood
22. An attacker redirects traffic by falsifying the IP address requested by ARP request
honeynet
stateful inspection
subnet
ARP poisoning
23. A logical connection point allowing computers and software to communicate and exchange data
subnet
twisted pair
session hijacking
port
24. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
private
NIDS
passive
static NAT
25. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
proxy
null session
split horizon DNS
dynamic NAT
26. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
man in the middle
website spoofing
behavior based
proxy
27. A set of rules computers use to communicate with each other across a network
ARP poisoning
protocol
PBX (Private Branch Exchange)
source - destination - protocol
28. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
protocol
active
dual homed
29. Allows all traffic except traffic that is specifically denied - also known as permissive access
router
split horizon DNS
cat5
allow by default
30. Amplifies the signal of incoming packets before broadcasting them to the network
knowledge based
stateful inspection
repeater
stateful inspection
31. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
application gateway
49 -152 - 65 -535
private
honeynet
32. A locked down/hardened host on the public side of the firewall highly exposed to attacks (i.e. web server - email server)
ping flooding
ping of death
bastion host
spoofing attacks
33. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
10base2
session hijacking
PBX (Private Branch Exchange)
coaxial
34. A group of hosts on logical network segment that communicate as if they were attached to the same broadcast domain - regardless of their physical location
VLAN
IP spoofing
encrypt session key
null session
35. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
content filter
PBX (Private Branch Exchange)
replay
fraggle
36. IP - email - website - DNS - and ARP
multi homed
spoofing attacks
risk mitigation
active
37. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
static NAT
split horizon DNS
tcp/ip hijacking
teardrop
38. Man in the middle attack where the content of an intercepted message is altered before it is sent on
port address translation
active
VLAN
application gateway
39. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
risk mitigation
broadcast domain
store and forward
static NAT
40. Protocol used to map an known IP address to its corresponding media access control (MAC) address
packet filter
protocol
49 -152 - 65 -535
ARP
41. Known as thicknet - 10mbps - limited to 500 meters
10Base5
port address translation
static NAT
behavior based
42. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
dynamic NAT
false negative
NIDS network connections
fiber optic
43. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
stateful inspection
spoofing attacks
port address translation
NIDS
44. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
zone transfer
dual homed
website spoofing
deny by default
45. A variation of a smurf attack using UDP
multiple interface firewall
bastion host
fraggle
teardrop
46. Examines a entire packet and determines action based on a complex set of rules
application gateway
active
store and forward
10Base5
47. Firewall with several NICs connected to different networks
multi homed
screened subnet
store and forward
passive
48. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
risk mitigation
10Base5
HIDS
IP spoofing
49. A packet filtering firewall works at this layer of the OSI model
network
0 - 1023
broadcast domain
repeater
50. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
active
protocol
extranet
NAT
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests