SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Level 1 firewall that looks at the head of a packet - (not content) - operates rapidly - application independent - either allow or deny packets
DoS attacks
SYN flood
NIPS
packet filter
2. A feature of firewalls / routers that disguise the IP address of internal systems allowing connection to the Internet using one public address
allow by default
NAT
smurf
dynamic NAT
3. Examines a entire packet and determines action based on a complex set of rules
PBX (Private Branch Exchange)
honeynet
DNS spoofing
application gateway
4. Crashing a computer by sending oversized packets (over 64 bytes) that it doesn't know how to handle
false positive
session hijacking
smurf
ping of death
5. IPS response method - terminate process/session - block/reject and redirect network traffic
defense in depth
extranet
active
honeypot
6. Monitors network traffic to identify possible attacks
false positive
NIDS
land attack
port address translation
7. Collection on honeypots
proxy
encrypt session key
null session
honeynet
8. An attacker redirects valid request to malicious sites by feeding a DNS server altered records which are retained in its cache
NIDS
dual homed
DNS spoofing
49 -152 - 65 -535
9. Head of a packet contains...
false negative
dual homed
HIDS
source - destination - protocol
10. Man in the middle attack where the attacker captures the traffic and sends it to the original recipient without altering the intercepted data
extranet
passive
router
cat5
11. Firewall with several NICs connected to different networks
multi homed
passive
ARP
stateful inspection
12. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
multiple interface firewall
active
extranet
behavior based
13. Cable used most in networks - maximum speed 1Gbps - maximum length 100 meters - susceptible to tap
allow by default
packet filter
false negative
twisted pair
14. One private IP address is mapped to one public IP address
DoS attacks
static NAT
layered
ping of death
15. Well known ports - allow administrative access - used for network services - considered only ports allowed to transmit traffic thru a firewall
dual homed
PBX (Private Branch Exchange)
ARP poisoning
0 - 1023
16. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
active
screened host
fraggle
private
17. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
split horizon DNS
behavior based
risk mitigation
replay
18. A firewall that checks all layers of a packet including content - verifying an expected response to a current communication session - also call a deep packet inspection
switch
SYN flood
stateful inspection
private
19. Two authoritative sources for your domain namespace with differing contents depending on whether the query is internal or external
split horizon DNS
subnet
packet filter
protocol
20. Attempt to block service or reduce activity by overloading the victim machine with ping requests
deny by default
ping flooding
passive
VLAN
21. A flaw in TCP/IP to verify that a packet really comes from the addess indicated in the IP header leads to this attack
IP spoofing
land attack
NIDS network connections
subnet
22. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
ARP poisoning
tcp/ip hijacking
split horizon DNS
deny by default
23. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
passive
fiber optic
router
defense in depth
24. Malicious activity not reported or detected
application gateway
false negative
layered
NIPS
25. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
cat3
informed
knowledge based
man in the middle and replay
26. One process on every system - use local system resources - detect attacks that NIDS misses - examine data after decrypted - can be OS specific - more expensive
private
multi homed
HIDS
ping of death
27. A server that sits between an intranet and it's Internet connection - masking all IP addresses
NIDS
null session
land attack
proxy server
28. Unauthenticated Windows session where an attacker can gather list of users - groups - machines - shares - user and host SID
behavior based
null session
fiber optic
man in the middle
29. Level 2 firewall often used to filter web traffic
ping flooding
dual homed
land attack
proxy
30. A decoy system - intentionally left exposed to attract/distract attackers - logs and monitors attacker activities
passive
honeypot
replay
encrypt session key
31. Attack where an attacker intercepts traffic and tricks parties at either end into believing they are communicating with each other
encrypt session key
extranet
NIDS
man in the middle
32. User / registered ports
screened host
1024 - 49 -151
NAT
proxy
33. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
spoofing attacks
protocol analyzer
split horizon DNS
spoofing
34. Packet filtering - proxies - stateful inspection
1024 - 49 -151
layered
firewalls
NIDS network connections
35. Used to pass data from one VLAN to another
fiber optic
protocol analyzer
IP spoofing
router
36. Allows all traffic except traffic that is specifically denied - also known as permissive access
allow by default
application gateway
bastion host
port address translation
37. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
ping of death
layered
source - destination - protocol
deny by default
38. Evolved from IDS - monitors network traffic - detects and responds to attack on network
tcp/ip hijacking
NIPS
network
application
39. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
active
10base2
smurf
content filter
40. A set of rules computers use to communicate with each other across a network
man in the middle
risk mitigation
multi homed
protocol
41. A logical division of a computer network - in which all nodes can reach each other by broadcast at the data link layer - equivalent to a VLAN
ping flooding
broadcast domain
protocol
land attack
42. Twisted pair cable with speed capability of 10Mbps
cat3
HIDS
source - destination - protocol
active
43. IDS that relies on the identification of known attack signatures
IP spoofing
0 - 1023
IP spoofing
knowledge based
44. Amplifies the signal of incoming packets before broadcasting them to the network
broadcast domain
smurf
protocol analyzer
repeater
45. DMZ implementation using two firewalls with different rule sets for the DMZ and intranet
proxy
1024 - 49 -151
layered
ping flooding
46. A sniffer mode used to capture traffic addressed to/from another machine on the network
promiscuous
firewall architectures
IP spoofing
dual homed
47. A DoS attack that subverts the normal "three way handshake" of TCP/IP by sending SYN packets - but no corresponding ACK packets
SYN flood
active
bastion host
ARP poisoning
48. An attacker redirects traffic by falsifying the IP address requested by ARP request
hub
VLAN
smurf
ARP poisoning
49. Known as thicknet - 10mbps - limited to 500 meters
HIDS
10Base5
dual homed
1024 - 49 -151
50. IDS that relies on usage patterns and baseline operation - can ID new vulnerability - high rate of false alarms
router
behavior based
port address translation
screened host