Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






2. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






3. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






4. True positive - false positive - true negative - false negative






5. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






6. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






7. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






8. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






9. Infects MBR - no network spreading potential






10. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






11. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






12. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






13. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






14. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






15. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






16. Unified data carrying service - replacing from replay and ATM






17. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application






18. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






19. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






20. Confidentiality - symmetric encryption






21. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






22. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






23. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






24. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






25. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






26. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.






27. It makes sure the data sent from one side to the other is in a format useful to the other side






28. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






30. Message in its encrypted form






31. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






32. Unencrypted message in its original form






33. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






34. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






35. 53 bytes - 48 bytes for data - 5 bytes for the header






36. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






37. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.






38. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit






39. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






40. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script






41. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






42. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






43. Personal area network - phone tethering - bluetooth - etc






44. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






45. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis






46. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






47. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network






48. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






49. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






50. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests