SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
firewalls
packet filter
man in the middle and replay
stateful inspection
2. IDS response method using logging and notification
store and forward
application
content filter
passive
3. User / registered ports
1024 - 49 -151
application
screened host
PBX (Private Branch Exchange)
4. Forging an IP address with the address of a trusted host
IP spoofing
allow by default
content filter
behavior based
5. Allows all traffic except traffic that is specifically denied - also known as permissive access
0 - 1023
fiber optic
allow by default
multi homed
6. Packets with a forged source IP address - purpose to conceal the identity of the sender or impersonate another computing system
passive
defense in depth
network
IP spoofing
7. Type of IP addresses not routed on the internet: 10.x.x.x - 172.16.x.x - 192.168.x.x
knowledge based
ARP poisoning
informed
private
8. Generate random TCP sequence numbers and encrypt traffic countermeasure what attacks
port
man in the middle and replay
static NAT
NAT
9. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
private
49 -152 - 65 -535
NAT
session hijacking
10. Capture and analyze network traffic - also known as packet analyzer - sniffer - network analyzer
ARP poisoning
NIDS
protocol analyzer
false positive
11. Twisted pair cable with speed capability of 1Gbps
firewalls
cat5
ping of death
ping flooding
12. Level 2 firewall often used to filter web traffic
active
router
proxy
ARP poisoning
13. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
IP spoofing
passive
null session
honeypot
14. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
source - destination - protocol
spoofing
dynamic NAT
false negative
15. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
dynamic NAT
PBX (Private Branch Exchange)
layered
store and forward
16. Attempt to block service or reduce activity by overloading the victim machine with ping requests
null session
screened subnet
ping flooding
packet filter
17. An attacker redirects traffic by falsifying the IP address requested by ARP request
screened subnet
ARP poisoning
firewalls
DNS spoofing
18. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
fiber optic
layered
passive
informed
19. Monitors network traffic to identify possible attacks
NIDS
VLAN
behavior based
router
20. Used by ISPs - single public network IP address is shared among many hosts on a private network - also known as PAT
port address translation
multiple interface firewall
active
screened subnet
21. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
multi homed
null session
active
extranet
22. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
port
coaxial
allow by default
behavior based
23. Firewall with two NICs - one internal and one external facing - NAT is often used with this firewall
port address translation
10Base5
dual homed
49 -152 - 65 -535
24. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
twisted pair
repeater
man in the middle and replay
router
25. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
man in the middle
multi homed
SYN flood
tcp/ip hijacking
26. A logical group of computers connected via a switch/hub that share the same network prefix in their IP address
10Base5
protocol
risk mitigation
subnet
27. Known as thinnet - 10mbps - limited to 185 meters
10base2
cat5
router
store and forward
28. Examines a entire packet and determines action based on a complex set of rules
protocol analyzer
false negative
broadcast domain
application gateway
29. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
source - destination - protocol
SYN flood
screened host
stateful inspection
30. Malicious activity not reported or detected
ping of death
risk mitigation
ARP poisoning
false negative
31. Network configuration that permits selected outsiders access internal information systems
encrypt session key
null session
SYN flood
extranet
32. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
proxy
teardrop
session hijacking
10Base5
33. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
deny by default
HIDS
twisted pair
protocol analyzer
34. Creating a illegitimate website with the intention of convincing victims that they are visiting a legitimate site - typically to collect confidential information
website spoofing
multiple interface firewall
proxy
promiscuous
35. Twisted pair cable with speed capability of 10Mbps
extranet
firewalls
cat3
PBX (Private Branch Exchange)
36. A set of rules computers use to communicate with each other across a network
port address translation
protocol
store and forward
passive
37. A complete transfer of all DNS zone information from one server to another
NAT
land attack
risk mitigation
zone transfer
38. Cable designed for transmission at higher speeds (100Mbps - 2Gbps) and longer distances (2km) - expensive -eliminates signal tapping
proxy
null session
fiber optic
application
39. IPS response method - terminate process/session - block/reject and redirect network traffic
firewalls
active
man in the middle and replay
HIDS
40. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
land attack
router
false positive
extranet
41. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
man in the middle and replay
NIDS
firewall architectures
0 - 1023
42. A packet filtering firewall works at this layer of the OSI model
network
HIDS
spoofing attacks
encrypt session key
43. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
content filter
extranet
website spoofing
packet filter
44. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
proxy
router
coaxial
IP spoofing
45. Amplifies the signal of incoming packets before broadcasting them to the network
ping flooding
multiple interface firewall
repeater
VLAN
46. Take control of a session between a server and client - the users gets kicked off the session while the attacker inserts himself into the session by sending a reset request to the client
session hijacking
NIPS
firewalls
website spoofing
47. Connects devices together to form a subnet - broadcasts incoming packets to all devices
store and forward
HIDS
hub
1024 - 49 -151
48. Bbenign activity reported as malicious
coaxial
false positive
firewall architectures
source - destination - protocol
49. A sniffer mode used to capture traffic addressed to/from another machine on the network
promiscuous
false positive
IP spoofing
tcp/ip hijacking
50. Bastion host - dual homed firewall - multi homed firewall - screened host - screened subnet
NIPS
cat5
firewall architectures
router