CompTIA Network+ #2

100 Questions | Attempts: 150
Share
SettingsSettings
Please wait...
  • 1/100 Questions

    Which IEEE standard defines the communication protocol for Wireless?

    • 802.3
    • 802.5
    • 802.11
    • 802.15
    • 802.16
Please wait...
CompTIA Network+ #2 - Quiz
About This Quiz

CompTIA Network+ #2


Quiz Preview

  • 2. 

    Which Command Line Utility is shown?

    • IPconfig

    • TracerT

    • NSlookup

    • Ping

    • Nbstat

    Correct Answer
    A. Ping
  • 3. 

    In a ______ attack the attacker places himself between the two hosts and listens in on the session, yet the hosts are unaware they are communicating to the hacker.

    • DOS

    • Man In The Middle Attack

    • Ping of Death

    • Smurf Attack

    • DDOS

    Correct Answer
    A. Man In The Middle Attack
  • 4. 

    • IPconfig

    • Nslookup

    • Netstat

    • Ping

    • Nbstat

    Correct Answer
    A. Netstat
  • 5. 

    Involves creating matching private and public keys by using the same passphrase and different algorithms. The owner of the private key is entrusted with generating and storing such keys. This describes which of the 4 set up and initialization stages for Public key infrestructure (PKT)?

    • Registration (PKT stage 1)

    • Key pair generation (PKT stage 2)

    • Certificate generation (PKT stage 3)

    • Certificate Dissemination (PKT stage )

    Correct Answer
    A. Key pair generation (PKT stage 2)
  • 6. 

    This is the science of encrypting and decrypting data. It is a technique in which source information is converted into a form which cannot be read by anyone other than intended recipient.

    • Encryption

    • Decryption

    • Cryptography

    • Asymetric keys

    • Asymetric Cryptography

    Correct Answer
    A. Cryptography
  • 7. 

    MAC & LLC (logical Linc Control) are sublayers of which OSI Layer?

    • Physical

    • Data Link

    • Network

    • Session

    • Transport

    Correct Answer
    A. Data Link
  • 8. 

    Which Command Line Utility is shown?

    • TracerT

    • Ping

    • Nbstat

    • IPconfig

    • Nslookup

    Correct Answer
    A. IPconfig
  • 9. 

    Which protocol is used to convert logical IP addresses to physical MAC addresses?

    • IMAP4 Internet Message Access Protocol 4

    • DNS Domain Name Service

    • ARP Address Resolution Protocol

    • RIP Routing Internet Protocol

    Correct Answer
    A. ARP Address Resolution Protocol
  • 10. 

    Which IEEE standard defines the communication protocol for Eithernet?

    • 802.3

    • 802.5

    • 802.11

    • 802.15

    • 802.16

    Correct Answer
    A. 802.3
  • 11. 

    Contains IP Addressing and subnet information along with other information to ensure that all devices have the correct addressing information.

    • Logical Network Diagram

    • Baseline

    • Regulations

    • Physical Network Diagram

    Correct Answer
    A. Logical Network Diagram
  • 12. 

    Which Command Line Utility is shown?

    • TracerT

    • Ping

    • IPconfig

    • NetStat

    • Nbstat

    Correct Answer
    A. TracerT
  • 13. 

    Which NIDS reaction option (Network Intrusion Detection System) sent warnings with console messages, emails, pager messages and so forth to request human intervention?

    • TCP reset (an active reaction)

    • IP session logging (a passive reaction)

    • Shunning (an active reaction)

    • Alerts (a passive reaction)

    • Antivirus scanning and cleaning (an active reaction)

    Correct Answer
    A. Alerts (a passive reaction)
  • 14. 

    Of the four components to security on a wireless network, to which one does a RADIUS server belong?

    • Access Controll

    • Authentication

    • Encryption

    • Isolation

    Correct Answer
    A. Authentication
  • 15. 

    To which TCP/IP architecture layer do email and web browser protocols belong to?

    • Application

    • Internet

    • Network Interface

    • Transport

    Correct Answer
    A. Application
  • 16. 

    Contains the locations of client computers, servers, network printers, routers, switches, firewalls wireless access points and other devices and hardware on the network.

    • Logical Network Diagram

    • Baseline

    • Regulations

    • Physical Network Diagram

    Correct Answer
    A. Physical Network Diagram
  • 17. 

    ______ is when an attacker puts a Web server between the victim's Web Browser and a legitimate server. The attacker monitors & records the victim's activity and can control what they see.

    • Information Theft

    • Man In The Middle Attack

    • Smurf Attack

    • Web Spoofing

    • DDOS

    Correct Answer
    A. Web Spoofing
  • 18. 

    Which NIDS reaction option (Network Intrusion Detection System) examines a packets contents, detecst infections and attempts removing infections from infected payloads?

    • TCP reset (an active reaction)

    • IP session logging (a passive reaction)

    • Shunning (an active reaction)

    • Alerts (a passive reaction)

    • Antivirus scanning and cleaning (an active reaction)

    Correct Answer
    A. Antivirus scanning and cleaning (an active reaction)
  • 19. 

    This NIDS reaction option (Network Intrusion Detection System) logs some or all of the traffic between the attacker and the victim for later forensic investigations.

    • TCP reset (an active reaction)

    • IP session logging (a passive reaction)

    • Shunning (an active reaction)

    • Alerts (a passive reaction)

    • Antivirus scanning and cleaning (an active reaction)

    Correct Answer
    A. IP session logging (a passive reaction)
  • 20. 

    This NIDS reaction option (Network Intrusion Detection System) is also called blocking, it involes automatically stopping packets from the attacker. Typically NIDS will connect to the firewall and create a temporary rule stopping all packets comming from the attacker.

    • TCP reset (an active reaction)

    • IP session logging (a passive reaction)

    • Shunning (an active reaction)

    • Alerts (a passive reaction)

    • Antivirus scanning and cleaning (an active reaction)

    Correct Answer
    A. Shunning (an active reaction)
  • 21. 

    The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:Negotiates the shared secret keys.

    • Authentication Header (AH)

    • Encapsulating Security Payload (ESP)

    • IP Payload Compression Protocol (IPComp)

    • Internet Key Exchange (IKE)

    Correct Answer
    A. Internet Key Exchange (IKE)
  • 22. 

    Rather than destroying or stealing data a ______ attack is designed to disrupt daily standard operations.

    • DOS

    • Synflood

    • Ping of Death

    • Smurf Attack

    • DDOS

    Correct Answer
    A. DOS
  • 23. 

    Which IEEE standard defines the communication protocol for Blue Tooth?

    • 802.3

    • 802.5

    • 802.11

    • 802.15

    • 802.16

    Correct Answer
    A. 802.15
  • 24. 

    When the attacker between two hosts takes over the role of one of the hosts and resumes full controll of the TCP session is what kind of attack?

    • Information Theft

    • Man In The Middle Attack

    • TCP Session Hijacking

    • Web Spoofing

    • ARP Poisoning

    Correct Answer
    A. TCP Session Hijacking
  • 25. 

    Which of the 3 main VPN security models does not typically use tunneling and clients, network devices and servers must authenticate before gaining access?

    • Authentication before connection

    • Trusted delivery network

    • Secure VPN's

    Correct Answer
    A. Authentication before connection
  • 26. 

    In this type of intrusion prevention, IDS monitors your system based on signatures, much like anti-virus scanners use use virus definitions to look for infected files. 

    • Signature - based

    • Behavior - based

    • Anomaly - based

    • Kerbos - based

    Correct Answer
    A. Signature - based
  • 27. 

    This authentication method encapsulates PPP inside Eithernet frames and allows users to establish a secure connection from one computer to another. Is used to connect multiple users to the internet via high speed modems.

    • CHAP (Challenge Handshake Protocol)

    • EAP (Extensible Authentication Protocol)

    • PPPoE (Point to Point over Eithernet Protocol)

    • Mutual Authentication

    Correct Answer
    A. PPPoE (Point to Point over Eithernet Protocol)
  • 28. 

    Which Command Line Utility is shown?

    • TracerT

    • Ping

    • Nslookup

    • Netstat

    • Nbstat

    Correct Answer
    A. Nslookup
  • 29. 

    The Ping utility is the most common use of which protocol?

    • ARP Adress Resolution Protocol

    • ICMP / ICMPv6 Internet Control Message Protocol

    • IGMP Internet Group Message Protocol

    • RIP Routing Internet Protocol

    Correct Answer
    A. ICMP / ICMPv6 Internet Control Message Protocol
  • 30. 

    The target systems in a ______ attack use Zombies, Bots or Agents which are woken up to launch the attack/

    • DOS

    • Synflood

    • Ping of Death

    • Smurf Attack

    • DDOS

    Correct Answer
    A. DDOS
  • 31. 

     This starts when a user approaches the Certificate Authority (CA) with a specific request for a certificate. After verifying the identity & credentials of the user CA registers the user. This describes which of the 4 set up and initialization stages for Public key infrestructure (PKT)?

    • Registration (PKT stage 1)

    • Key pair generation (PKT stage 2)

    • Certificate generation (PKT stage 3)

    • Certificate Dissemination (PKI stage 4)

    Correct Answer
    A. Registration (PKT stage 1)
  • 32. 

    What port is used by NNTP (Network NewsTransfer Protocol)?

    • UDP69

    • TCP161 / UDP161

    • TCP110

    • TCP22

    • TCP119

    Correct Answer
    A. TCP119
  • 33. 

    This authentication defines message formats rather than being an authentication mechanism. There are more than 40 of these methods now. They are PPP extensions also used in wireless with multiple authentication methods.

    • CHAP (Challenge Handshake Protocol)

    • EAP (Extensible Authentication Protocol)

    • PPPoE (Point to Point over Eithernet Protocol)

    • Mutual Authentication

    Correct Answer
    A. EAP (Extensible Authentication Protocol)
  • 34. 

    The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:Compresses packet data before transmission.

    • Authentication Header (AH)

    • Encapsulating Security Payload (ESP)

    • IP Payload Compression Protocol (IPComp)

    • Internet Key Exchange (IKE)

    Correct Answer
    A. IP Payload Compression Protocol (IPComp)
  • 35. 

    ______ contains performance statistics for computers and other devices in the network, you record a devices ______ performance when adding it to the network to hev the data for copairison purposes later. 

    • Logical Network Diagram

    • Baseline

    • Regulations

    • Physical Network Diagram

    Correct Answer
    A. Baseline
  • 36. 

    To which TCP/IP architecture layer do TCP and UDP belong?

    • Application

    • Internet

    • Network Interface

    • Transport

    Correct Answer
    A. Transport
  • 37. 

     Which command line utility is shown?

    • IPconfig

    • TracerT

    • Netstat

    • Nslookup

    • Nbstat

    Correct Answer
    A. Nbstat
  • 38. 

    When an attacker instructs a router to forward packets with a destination of the victim to instead go through the attackers system it is called _________.

    • ARP Poisoning

    • ICMP Redirect

    • TCP Session Hijacking

    • Information Theft

    • Web Spoofing

    Correct Answer
    A. ICMP Redirect
  • 39. 

    Which TCP / IP architecture layer makes use of ports?

    • Application

    • Internet

    • Network Interface

    • Transport

    Correct Answer
    A. Transport
  • 40. 

    It involves securely making the certificate information available to a requester without too much difficulty. Some teqnuques include out-of- and in hand distribution, publication, and so on. This describes which of the 4 set up and initialization stages for Public key infrestructure (PKI)?

    • Registration (PKT stage 1)

    • Key pair generation (PKT stage 2)

    • Certificate generation (PKT stage 3)

    • Certificate Dissemination (PKT stage )

    Correct Answer
    A. Certificate Dissemination (PKT stage )
  • 41. 

    Which of the 3 main VPN security models are the typical sort of network, enabled secure connections over insecure public networks.

    • Authentication before connection

    • Trusted delivery network

    • Secure VPN's

    Correct Answer
    A. Secure VPN's
  • 42. 

    What port is used by SSH (Secure Shell)?

    • UDP 67 / UDP68

    • TCP161 / UDP161

    • TCP143 / UDP143

    • TCP22 / UDP22

    • NTP123

    Correct Answer
    A. TCP22 / UDP22
  • 43. 

    Which IEEE standard defines the communication protocol for Token Ring?

    • 802.3

    • 802.5

    • 802.11

    • 802.15

    • 802.16

    Correct Answer
    A. 802.5
  • 44. 

    Of the NIDS (Network intrusion detection system) reaction options listed which Three are considered Active reaction options?

    • TCP reset

    • IP session logging

    • Antivirus scanning and cleaning

    • Shunning

    • Alerts

    Correct Answer(s)
    A. TCP reset
    A. Antivirus scanning and cleaning
    A. Shunning
  • 45. 

    The NIDS reaction option (Network Intrusion Detection System) where the NIDS sends a TCP packet to the victim host which terminates all sessions and haults the attack in progress.

    • TCP reset (an active reaction)

    • IP session logging (a passive reaction)

    • Shunning (an active reaction)

    • Alerts (a passive reaction)

    • Antivirus scanning and cleaning (an active reaction)

    Correct Answer
    A. TCP reset (an active reaction)
  • 46. 

    124.6.102.87 is a Class _____ IP Address.

    • A

    • B

    • C

    • D

    • E

    Correct Answer
    A. A
  • 47. 

    After installing the DHCP server on a domain member server, what must be done in active directory before it begins delivering leased IP addresses?

    • Authorize it

    • Reinstal Active Directory

    • Activate it

    • Modify the Firewall

    Correct Answer
    A. Authorize it
  • 48. 

    This component is the server or client that Kerbos can assign tickets to.

    • Principal

    • Authentication Server (AS)

    • Ticket-Granting Server (TGS)

    • Key Distribution Center (KDC)

    • Realm

    Correct Answer
    A. Principal
  • 49. 

    __________ are designed to fix security vulnerabilities.

    • Hotfixes

    • Patches

    • Updates

    • BIOS Updates

    Correct Answer
    A. Patches

Quiz Review Timeline (Updated): Jan 10, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 10, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 03, 2010
    Quiz Created by
    Rayandlisaj
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.