CompTIA Network+ #2

100 Questions | Attempts: 150
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Which IEEE standard defines the communication protocol for Wireless?
Submit
Please wait...
About This Quiz
CompTIA Network+ #2 - Quiz

CompTIA Network+ #2

2.
We’ll put your name on your report, certificate, and leaderboard.
2.
Which Command Line Utility is shown?
Submit
3. In a ______ attack the attacker places himself between the two hosts and listens in on the session, yet the hosts are unaware they are communicating to the hacker.
Submit
4.
Submit
5. Involves creating matching private and public keys by using the same passphrase and different algorithms. The owner of the private key is entrusted with generating and storing such keys. This describes which of the 4 set up and initialization stages for Public key infrestructure (PKT)?
Submit
6. This is the science of encrypting and decrypting data. It is a technique in which source information is converted into a form which cannot be read by anyone other than intended recipient.
Submit
7. MAC & LLC (logical Linc Control) are sublayers of which OSI Layer?
Submit
8.
Which Command Line Utility is shown?
Submit
9. Which protocol is used to convert logical IP addresses to physical MAC addresses?
Submit
10. Which IEEE standard defines the communication protocol for Eithernet?
Submit
11. Contains IP Addressing and subnet information along with other information to ensure that all devices have the correct addressing information.
Submit
12.
Which Command Line Utility is shown?
Submit
13. Which NIDS reaction option (Network Intrusion Detection System) sent warnings with console messages, emails, pager messages and so forth to request human intervention?
Submit
14. Of the four components to security on a wireless network, to which one does a RADIUS server belong?
Submit
15. To which TCP/IP architecture layer do email and web browser protocols belong to?
Submit
16. Contains the locations of client computers, servers, network printers, routers, switches, firewalls wireless access points and other devices and hardware on the network.
Submit
17. ______ is when an attacker puts a Web server between the victim's Web Browser and a legitimate server. The attacker monitors & records the victim's activity and can control what they see.
Submit
18. Which NIDS reaction option (Network Intrusion Detection System) examines a packets contents, detecst infections and attempts removing infections from infected payloads?
Submit
19. This NIDS reaction option (Network Intrusion Detection System) logs some or all of the traffic between the attacker and the victim for later forensic investigations.
Submit
20. This NIDS reaction option (Network Intrusion Detection System) is also called blocking, it involes automatically stopping packets from the attacker. Typically NIDS will connect to the firewall and create a temporary rule stopping all packets comming from the attacker.
Submit
21. The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:
Negotiates the shared secret keys.
Submit
22. Rather than destroying or stealing data a ______ attack is designed to disrupt daily standard operations.
Submit
23. Which IEEE standard defines the communication protocol for Blue Tooth?
Submit
24. When the attacker between two hosts takes over the role of one of the hosts and resumes full controll of the TCP session is what kind of attack?
Submit
25. Which of the 3 main VPN security models does not typically use tunneling and clients, network devices and servers must authenticate before gaining access?
Submit
26. In this type of intrusion prevention, IDS monitors your system based on signatures, much like anti-virus scanners use use virus definitions to look for infected files. 
Submit
27. This authentication method encapsulates PPP inside Eithernet frames and allows users to establish a secure connection from one computer to another. Is used to connect multiple users to the internet via high speed modems.
Submit
28.
Which Command Line Utility is shown?
Submit
29. The Ping utility is the most common use of which protocol?
Submit
30. The target systems in a ______ attack use Zombies, Bots or Agents which are woken up to launch the attack/
Submit
31.  This starts when a user approaches the Certificate Authority (CA) with a specific request for a certificate. After verifying the identity & credentials of the user CA registers the user. This describes which of the 4 set up and initialization stages for Public key infrestructure (PKT)?
Submit
32. What port is used by NNTP (Network NewsTransfer Protocol)?
Submit
33. This authentication defines message formats rather than being an authentication mechanism. There are more than 40 of these methods now. They are PPP extensions also used in wireless with multiple authentication methods.
Submit
34. The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:
Compresses packet data before transmission.
Submit
35. ______ contains performance statistics for computers and other devices in the network, you record a devices ______ performance when adding it to the network to hev the data for copairison purposes later. 
Submit
36. To which TCP/IP architecture layer do TCP and UDP belong?
Submit
37.  
Which command line utility is shown?
Submit
38. When an attacker instructs a router to forward packets with a destination of the victim to instead go through the attackers system it is called _________.
Submit
39. Which TCP / IP architecture layer makes use of ports?
Submit
40. It involves securely making the certificate information available to a requester without too much difficulty. Some teqnuques include out-of- and in hand distribution, publication, and so on. This describes which of the 4 set up and initialization stages for Public key infrestructure (PKI)?
Submit
41. Which of the 3 main VPN security models are the typical sort of network, enabled secure connections over insecure public networks.
Submit
42. What port is used by SSH (Secure Shell)?
Submit
43. Which IEEE standard defines the communication protocol for Token Ring?
Submit
44. Of the NIDS (Network intrusion detection system) reaction options listed which Three are considered Active reaction options?
Submit
45. The NIDS reaction option (Network Intrusion Detection System) where the NIDS sends a TCP packet to the victim host which terminates all sessions and haults the attack in progress.
Submit
46. 124.6.102.87 is a Class _____ IP Address.
Submit
47. After installing the DHCP server on a domain member server, what must be done in active directory before it begins delivering leased IP addresses?
Submit
48. This component is the server or client that Kerbos can assign tickets to.
Submit
49. __________ are designed to fix security vulnerabilities.
Submit
50. 224.106.27.170 is a Class _____ IP Address.
Submit
51. Is done through the use of algorithm which is a mathmatical or physical means to transform a message.
Submit
52. The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:
Ensures confidentiality by signing packet by encryting the packet using DES or Triple-DES (3DES) cipher.
Submit
53. What port is used by BootP & DHCP (Boot Protocl/Bootstrap Protocol & Dynamic Host Configuration Protocol)?
Submit
54. A standarsized tunneling protocol that generally combines the best features of PPTP and L2F to provide tunneling over IP, X.25, Frame Relay and ATM networks.
Submit
55. Which protocol is responsible for the logical addressing of each packet created by the Transport Layer?
Submit
56. What port is used by SNMP (Simple Network Management Protocol)?
Submit
57. When traffic is redirected by an attacker by modifiying the victims DNS cache with the wrong hostname to IP address mappings it is called ______.
Submit
58. Which is NOT a valid subnet mask?
Submit
59. This Kerbos component service provides an authorized service or user with temporary session keys and tickets.
Submit
60. A standardized network protocol that encrypts data at the Network (OSI Layer 3) Layer of the protocol stack. Can supply security for both TCP and UDP traffic.
Submit
61. Which type of attack sent an oversized fragmented packet that when reassembled would cause the buffer to overflow and the system to crash?
Submit
62. To which TCP/IP architecture layer do the media access methods belong?
Submit
63. This authentication method validates the remote client's identity Is used by PPP at the communication session start or any time during the session.
Submit
64. What port is used by TFTP (Trivial File Transfer Protocol)?
Submit
65. What was introduced to make IPv4 Internet routing more efficient.
Submit
66. This Kerbos item is used in communication between client and resource server and only lasts the length of a single log in.
Submit
67. What type of attack sends a lot of 1/2 open TCP connections which prevent users from being able to access the server?
Submit
68. The users in a subset of Kerbos are refered to as a __________.
Submit
69. This uses two keys to avoid the troubles associated with sharing the encryption key. What is encryted by one key can only be decryted by the other.
Submit
70. _________ is when an attacker passivly records data passing between hosts to gather sensitive information usernames and passwords.
Submit
71. To which TCP/IP architecture layer do routing protocols belong?
Submit
72. Of the NIDS (Network intrusion detection system) reaction options listed which TWO are considered Passive reaction options?
Submit
73. In this type of intrusion prevention, IDS compares the current state of your system to a baseline looking for differences that would signal an attack or compromise in the system.
Submit
74. This is a VPN protocol were once a link has been established, the client is added as a vertual node on the LAN and packets between the two are encrypted using Microsoft Point to Point Encryption (MPPE) as a rule.
Submit
75. Which is the correct order for the 3 AAA Phases?
Submit
76. Data information is sent onto the network cable using which of the following?
Submit
77. 243.16.2.117 is a Class _____ IP Address.
Submit
78. Which of the 3 main VPN security models are 3rd party private networks protected by various means. Clients and servers connect to this network rather than connect to an LAN via a public network.
Submit
79. The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:
Ensures authentisity by signing packet data with MD5 or SHA-1 hashes and a shared secret key.
Submit
80. What port is used by NTP (Network Time Protocol)?
Submit
81. This authentication method requires both the client and the server to authenticate to each other instead of just the client authenticating to the server. Also known as two way authentication.
Submit
82. Which IEEE standard defines the communication protocol for Air Cards?
Submit
83. Which of the following protocols are considered unsecure? (Choose all that apply)
Submit
84. This binds an entity's unique distinguished name (DN) and other identifying attributes to it's public key, and is always the responsibility of the CA (Certificate Authority). This describes which of the 4 set up and initialization stages for Public key infrestructure (PKI)?
Submit
85. When public and private keys are related matmatically, the RSA cypher starts with two large random prime numbers that essentially make up the private key and the two nubers are then multiplied together to make the public key.
Submit
86. This is a server component of Kerbos that runs AG and TGS services to provide initial ticket and ticket-Granting ticket requests.
Submit
87. This Kerbos item  is a record that usually lasts for 5 minutes and can not be reused. It contains information to prove the session key was recently created and is known only to the client and server.
Submit
88. This Kerbos item is a record used by a client to authenticate to a server. It contains the clients identity, session key, timestamp and checksum. The recods is secured by the resource servers secret key.
Submit
89. An IPv6 subnet ID is how many bits long?
Submit
90. This item is granted during the Kerbos authentication process. It is used to aquire additional tickets from the TGS.
Submit
91. Which type of attack overwhelms a host by flooding it with ICMP packets?
Submit
92. A realm is also known as a __________?
Submit
93. Which is the correct hexidecimal subnet chain?
Submit
94. During a certificates 10 stage life cycle which of these are the first stage?
Submit
95. This Kerbos item is a ticket for the resource server along with the session key.
Submit
96. Using certain programs this type of attack allows the attacker to monitor and modify a TCP session.  The attacker does need to be on the same Eithernet segment as the victim or the host.
Submit
97. A 3rd party authorized to generate keys and send them would define which?
Submit
98. Which of the following are client options that can be set at the scope level? (Choose all that apply)
Submit
99. This Kerbos component is a service that gives ticket-granting tickets to an authroized service or user.
Submit
100. During a certificates 10 stage life cycle which of these are the last stage?
Submit
View My Results
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which IEEE standard defines the communication protocol for Wireless?
Which Command Line Utility is shown?
In a ______ attack the attacker places himself between the two hosts...
Involves creating matching private and public keys by using the...
This is the science of encrypting and decrypting data. It is a...
MAC & LLC (logical Linc Control) are sublayers of which OSI Layer?
Which Command Line Utility is shown?
Which protocol is used to convert logical IP addresses to physical MAC...
Which IEEE standard defines the communication protocol for Eithernet?
Contains IP Addressing and subnet information along with other...
Which Command Line Utility is shown?
Which NIDS reaction option (Network Intrusion Detection System) sent...
Of the four components to security on a wireless network, to which one...
To which TCP/IP architecture layer do email and web browser protocols...
Contains the locations of client computers, servers, network printers,...
______ is when an attacker puts a Web server between the victim's Web...
Which NIDS reaction option (Network Intrusion Detection System)...
This NIDS reaction option (Network Intrusion Detection System)...
This NIDS reaction option (Network Intrusion Detection System) is...
The IPsec protocol suite is made up of 4 separate protocols, which is...
Rather than destroying or stealing data a ______ attack is designed to...
Which IEEE standard defines the communication protocol for Blue Tooth?
When the attacker between two hosts takes over the role of one of the...
Which of the 3 main VPN security models does not typically use...
In this type of intrusion prevention, IDS monitors your system based...
This authentication method encapsulates PPP inside Eithernet frames...
Which Command Line Utility is shown?
The Ping utility is the most common use of which protocol?
The target systems in a ______ attack use Zombies, Bots or Agents...
 This starts when a user approaches the Certificate Authority...
What port is used by NNTP (Network NewsTransfer Protocol)?
This authentication defines message formats rather than being an...
The IPsec protocol suite is made up of 4 separate protocols, which is...
______ contains performance statistics for computers and other devices...
To which TCP/IP architecture layer do TCP and UDP belong?
 Which command line utility is shown?
When an attacker instructs a router to forward packets with a...
Which TCP / IP architecture layer makes use of ports?
It involves securely making the certificate information available to a...
Which of the 3 main VPN security models are the typical sort of...
What port is used by SSH (Secure Shell)?
Which IEEE standard defines the communication protocol for Token Ring?
Of the NIDS (Network intrusion detection system) reaction options...
The NIDS reaction option (Network Intrusion Detection System)...
124.6.102.87 is a Class _____ IP Address.
After installing the DHCP server on a domain member server, what must...
This component is the server or client that Kerbos can assign tickets...
__________ are designed to fix security vulnerabilities.
224.106.27.170 is a Class _____ IP Address.
Is done through the use of algorithm which is a mathmatical or...
The IPsec protocol suite is made up of 4 separate protocols, which is...
What port is used by BootP & DHCP (Boot Protocl/Bootstrap...
A standarsized tunneling protocol that generally combines the best...
Which protocol is responsible for the logical addressing of each...
What port is used by SNMP (Simple Network Management Protocol)?
When traffic is redirected by an attacker by modifiying the victims...
Which is NOT a valid subnet mask?
This Kerbos component service provides an authorized service or...
A standardized network protocol that encrypts data at the Network (OSI...
Which type of attack sent an oversized fragmented packet that when...
To which TCP/IP architecture layer do the media access methods...
This authentication method validates the remote client's identity Is...
What port is used by TFTP (Trivial File Transfer Protocol)?
What was introduced to make IPv4 Internet routing more efficient.
This Kerbos item is used in communication between client and resource...
What type of attack sends a lot of 1/2 open TCP connections which...
The users in a subset of Kerbos are refered to as a __________.
This uses two keys to avoid the troubles associated with sharing the...
_________ is when an attacker passivly records data passing between...
To which TCP/IP architecture layer do routing protocols belong?
Of the NIDS (Network intrusion detection system) reaction options...
In this type of intrusion prevention, IDS compares the current state...
This is a VPN protocol were once a link has been established, the...
Which is the correct order for the 3 AAA Phases?
Data information is sent onto the network cable using which of the...
243.16.2.117 is a Class _____ IP Address.
Which of the 3 main VPN security models are 3rd party private networks...
The IPsec protocol suite is made up of 4 separate protocols, which is...
What port is used by NTP (Network Time Protocol)?
This authentication method requires both the client and the server to...
Which IEEE standard defines the communication protocol for Air Cards?
Which of the following protocols are considered unsecure? (Choose all...
This binds an entity's unique distinguished name (DN) and other...
When public and private keys are related matmatically, the RSA cypher...
This is a server component of Kerbos that runs AG and TGS services to...
This Kerbos item  is a record that usually lasts for 5 minutes...
This Kerbos item is a record used by a client to authenticate to a...
An IPv6 subnet ID is how many bits long?
This item is granted during the Kerbos authentication process. It is...
Which type of attack overwhelms a host by flooding it with ICMP...
A realm is also known as a __________?
Which is the correct hexidecimal subnet chain?
During a certificates 10 stage life cycle which of these are the first...
This Kerbos item is a ticket for the resource server along with the...
Using certain programs this type of attack allows the attacker to...
A 3rd party authorized to generate keys and send them would define...
Which of the following are client options that can be set at the scope...
This Kerbos component is a service that gives ticket-granting tickets...
During a certificates 10 stage life cycle which of these are...
Alert!

Back to Top Back to top
Advertisement