These Comptia Security +: Network Security multiple-choice questions and their answers will help you strengthen your grip on the subject of Comptia Security +: Network Security. You can prepare for an upcoming exam or job interview with these 30 Comptia Security +: Network Security MCQs.
So scroll down and start answering.
A. Private
B. Cat3
C. Null session
D. Screened host
A. HIDS
B. Deny by default
C. Land attack
D. Man in the middle
A. Honeypot
B. Spoofing
C. Layered
D. Proxy
A. SYN flood
B. Man in the middle
C. Router
D. Ping flooding
A. Fraggle
B. Store and forward
C. Cat3
D. Protocol
A. Broadcast domain
B. Stateful inspection
C. NIPS
D. Multi homed
A. 0 - 1023
B. NIDS
C. Encrypt session key
D. NIPS
A. Ping flooding
B. NIDS
C. Private
D. ARP
A. Smurf
B. Informed
C. 10base2
D. Honeypot
A. Multiple interface firewall
B. PBX (Private Branch Exchange)
C. Knowledge based
D. Switch
A. Multiple interface firewall
B. Blind
C. 10base2
D. Stateful inspection
A. Knowledge based
B. Proxy
C. Promiscuous
D. Land attack
A. 10Base5
B. Application gateway
C. Fiber optic
D. Passive
A. Proxy
B. Informed
C. Promiscuous
D. IP spoofing
A. Replay
B. Null session
C. Blind
D. Protocol analyzer
A. Deny by default
B. NIPS
C. Screened subnet
D. Private
A. NIDS
B. Spoofing
C. Protocol
D. Encrypt session key
A. Screened host
B. Multi homed
C. Informed
D. Switch
A. Smurf
B. Firewalls
C. Honeynet
D. Stateful inspection
A. Switch
B. Honeypot
C. Cat5
D. Teardrop
A. Dynamic NAT
B. IP spoofing
C. Multi homed
D. Firewalls
A. IP spoofing
B. Coaxial
C. Knowledge based
D. 49 -152 - 65 -535
A. DoS attacks
B. Deny by default
C. Informed
D. Firewalls
A. 1024 - 49 -151
B. IP spoofing
C. Application
D. NIDS network connections
A. 10Base5
B. Proxy
C. NIDS
D. False negative
A. DNS spoofing
B. NIPS
C. Dual homed
D. Store and forward
A. Extranet
B. Packet filter
C. Router
D. Screened subnet
A. Replay
B. Land attack
C. Man in the middle
D. Passive
A. Tcp/ip hijacking
B. HIDS
C. Subnet
D. Content filter
A. Stateful inspection
B. Tcp/ip hijacking
C. Smurf
D. Hub
A. Plaintext
B. Ciphertext
C. Encriptext
D. Cryptotext
A. Black holing
B. ICMP echo
C. P2P redirect
D. None of the above