Security+ (Syo-201) Domain #2: Network Infrastructure

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Baldeagle79
B
Baldeagle79
Community Contributor
Quizzes Created: 2 | Total Attempts: 3,860
Questions: 10 | Attempts: 1,547

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Covers Domain 2 of the SYO-201 exam for Security+.


Questions and Answers
  • 1. 

    In this configuration, users can upload files to an FTP server, but they cannot view or download the contents.

    • A.

      Blind FTP

    • B.

      Secret FTP

    • C.

      Secured FTP

    • D.

      TFTP

    Correct Answer
    A. Blind FTP
    Explanation
    Blind FTP refers to a configuration where users can only upload files to an FTP server, but they are unable to view or download the contents. This means that users can only transfer files to the server without any visibility or access to the existing files on the server. This configuration is often used for security purposes, where organizations want to restrict access to sensitive data on the server and only allow file uploads.

    Rate this question:

  • 2. 

    What type of attack is likely occuring if you see a significant increase in network traffic and users complain that the web server is hung up?

    • A.

      MITM

    • B.

      DNS spoofing

    • C.

      Ping sweep

    • D.

      DoS

    Correct Answer
    D. DoS
    Explanation
    If there is a significant increase in network traffic and users are complaining that the web server is hung up, it is likely that a Denial of Service (DoS) attack is occurring. A DoS attack involves overwhelming a system or network with excessive traffic or requests, causing it to become unresponsive or crash. This type of attack aims to disrupt the availability of a service or resource, which aligns with the symptoms described in the question.

    Rate this question:

  • 3. 

    What type of attack includes sending numerous ICMP reply packets?

    • A.

      Fraggle

    • B.

      Smurf

    • C.

      Syn flood

    • D.

      Teardrop

    Correct Answer
    B. Smurf
    Explanation
    The correct answer is "smurf". A smurf attack is a type of DDoS attack where the attacker sends a large number of ICMP echo request packets (ping) to a broadcast IP address, with the source IP address spoofed to be the victim's IP address. This causes all the devices on the network to respond to the victim's IP address, overwhelming it with traffic and potentially causing it to crash or become unavailable.

    Rate this question:

  • 4. 

    Which of the following is NOT a private IP range?

    • A.

      10.0.0.0 - 10.255.255.255

    • B.

      127.0.0.0 - 127.255.255.255

    • C.

      172.16.0.0 - 172.32.255.255

    • D.

      192.168.0.0 - 192.168.255.255

    Correct Answer
    B. 127.0.0.0 - 127.255.255.255
    Explanation
    The IP range 127.0.0.0 - 127.255.255.255 is not a private IP range. It is reserved for loopback addresses, which means it is used to test network connections on the local host. This range is used to communicate with the network stack on the same device and is not routable on the internet. The other three options (10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.32.255.255, and 192.168.0.0 - 192.168.255.255) are all private IP ranges that are commonly used in local networks.

    Rate this question:

  • 5. 

    This type of firewall, also called a proxy, filters traffic based on the application or service used and requires the most resources or network bandwidth?

    • A.

      Application-level

    • B.

      Circuit-level

    • C.

      Packet filter

    • D.

      Stateful inspection

    Correct Answer
    A. Application-level
    Explanation
    An application-level firewall, also known as a proxy, filters traffic based on the specific application or service being used. This type of firewall requires the most resources or network bandwidth because it examines the contents of each packet and makes decisions based on the application layer protocols. It provides a higher level of security by analyzing the data and enforcing security policies specific to each application, but this level of inspection and processing requires more resources compared to other types of firewalls.

    Rate this question:

  • 6. 

    This is a fictitious environment that serves as bait for hackers to waste time and resources. 

    • A.

      DMZ

    • B.

      Honey pot

    • C.

      Honey suckle

    • D.

      Internet content filter

    Correct Answer
    B. Honey pot
    Explanation
    A honey pot is a security mechanism that is designed to attract and deceive hackers. It is a fictitious environment that appears to be a valuable target, but in reality, it is isolated and closely monitored by security professionals. The purpose of a honey pot is to distract and waste the time and resources of hackers, while also gathering information about their tactics and techniques. By luring hackers into the honey pot, organizations can gather valuable intelligence and protect their actual systems and data from real attacks.

    Rate this question:

  • 7. 

    This intrusion detection system look at the host system's audit trails and log files.

    • A.

      NIDS

    • B.

      NIPS

    • C.

      HIDS

    • D.

      KIDS

    Correct Answer
    C. HIDS
    Explanation
    HIDS stands for Host-based Intrusion Detection System. This type of intrusion detection system focuses on monitoring and analyzing the audit trails and log files of a specific host system. It is designed to detect and respond to any suspicious or unauthorized activities that may occur on the host system. Unlike network-based intrusion detection systems (NIDS), which monitor network traffic, HIDS is specifically tailored to protect the host system itself. Therefore, HIDS is the correct answer in this context.

    Rate this question:

  • 8. 

    Reverse hash matching, used to target a cryptographic hash based on the probability that a value can be guessed is known as what?

    • A.

      Birthday attack

    • B.

      Crypto hack

    • C.

      Nerd attack

    • D.

      Algorithm matching

    Correct Answer
    A. Birthday attack
    Explanation
    Reverse hash matching, also known as a birthday attack, is a technique used to target a cryptographic hash by exploiting the probability that two different inputs can produce the same hash value. It takes advantage of the birthday paradox, which states that in a group of randomly chosen people, there is a high likelihood that two people will share the same birthday. Similarly, in hash functions, there is a higher probability of finding two different inputs that produce the same hash value. This attack is used to crack hashed passwords or find collisions in hash functions.

    Rate this question:

  • 9. 

    Which type of cabling allows for the greatest protection against compromising emanations and eavesdropping?

    • A.

      Shielded Twisted Pair (STP)

    • B.

      Coax

    • C.

      Wireless

    • D.

      Fiber optic

    Correct Answer
    D. Fiber optic
    Explanation
    Fiber optic cabling allows for the greatest protection against compromising emanations and eavesdropping. This is because fiber optic cables use light signals to transmit data, rather than electrical signals used in other types of cables. This makes it extremely difficult for hackers or eavesdroppers to intercept or tap into the data being transmitted through fiber optic cables. Additionally, fiber optic cables are immune to electromagnetic interference, providing an extra layer of protection against compromising emanations.

    Rate this question:

  • 10. 

    What protocol is defined by the IEEE 802.11 standard?

    • A.

      WEP

    • B.

      WPA

    • C.

      WAP

    • D.

      POW

    Correct Answer
    A. WEP
    Explanation
    The correct answer is WEP. The IEEE 802.11 standard defines the Wireless Equivalent Privacy (WEP) protocol. WEP is a security protocol used to secure wireless networks. It provides encryption and authentication mechanisms to protect data transmitted over a wireless network. However, it is now considered weak and vulnerable to attacks, and it has been largely replaced by more secure protocols like WPA and WPA2.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 15, 2009
    Quiz Created by
    Baldeagle79
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.