Security+ (Syo-201) Domain #2: Network Infrastructure

10 Questions | Total Attempts: 1505

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Covers Domain 2 of the SYO-201 exam for Security+.


Questions and Answers
  • 1. 
    In this configuration, users can upload files to an FTP server, but they cannot view or download the contents.
    • A. 

      Blind FTP

    • B. 

      Secret FTP

    • C. 

      Secured FTP

    • D. 

      TFTP

  • 2. 
    What type of attack is likely occuring if you see a significant increase in network traffic and users complain that the web server is hung up?
    • A. 

      MITM

    • B. 

      DNS spoofing

    • C. 

      Ping sweep

    • D. 

      DoS

  • 3. 
    What type of attack includes sending numerous ICMP reply packets?
    • A. 

      Fraggle

    • B. 

      Smurf

    • C. 

      Syn flood

    • D. 

      Teardrop

  • 4. 
    Which of the following is NOT a private IP range?
    • A. 

      10.0.0.0 - 10.255.255.255

    • B. 

      127.0.0.0 - 127.255.255.255

    • C. 

      172.16.0.0 - 172.32.255.255

    • D. 

      192.168.0.0 - 192.168.255.255

  • 5. 
    This type of firewall, also called a proxy, filters traffic based on the application or service used and requires the most resources or network bandwidth?
    • A. 

      Application-level

    • B. 

      Circuit-level

    • C. 

      Packet filter

    • D. 

      Stateful inspection

  • 6. 
    This is a fictitious environment that serves as bait for hackers to waste time and resources. 
    • A. 

      DMZ

    • B. 

      Honey pot

    • C. 

      Honey suckle

    • D. 

      Internet content filter

  • 7. 
    This intrusion detection system look at the host system's audit trails and log files.
    • A. 

      NIDS

    • B. 

      NIPS

    • C. 

      HIDS

    • D. 

      KIDS

  • 8. 
    Reverse hash matching, used to target a cryptographic hash based on the probability that a value can be guessed is known as what?
    • A. 

      Birthday attack

    • B. 

      Crypto hack

    • C. 

      Nerd attack

    • D. 

      Algorithm matching

  • 9. 
    Which type of cabling allows for the greatest protection against compromising emanations and eavesdropping?
    • A. 

      Shielded Twisted Pair (STP)

    • B. 

      Coax

    • C. 

      Wireless

    • D. 

      Fiber optic

  • 10. 
    What protocol is defined by the IEEE 802.11 standard?
    • A. 

      WEP

    • B. 

      WPA

    • C. 

      WAP

    • D. 

      POW

Back to Top Back to top