Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






2. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






3. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched






4. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






5. destruction of data - leaking confidential information - providing backdoor access






6. Relies on executable code insertion and user interaction to spread






7. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


8. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






9. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






10. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






11. Full open - half open (stealth scan) - UDP - Ping






12. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






13. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






14. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






15. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






16. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






17. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






18. Provides insight into the tactics - motives - and attacker tools






19. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






20. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






21. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






22. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






23. A cracking tool inserted into the OS that allows the attacker to do as they please.






24. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






25. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






26. Unencrypted message in its original form






27. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






28. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






30. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






31. Unified data carrying service - replacing from replay and ATM






32. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






33. It handles the establishment and maintenance of connections between systems






34. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






35. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






36. 53 bytes - 48 bytes for data - 5 bytes for the header






37. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






38. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.






39. It makes sure the data sent from one side to the other is in a format useful to the other side






40. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






41. Syn - Syn/Ack - Ack






42. Malware - insider threat - natural disaster - terrorism - pandemic






43. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






44. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






45. Protected at rest - protected in transit - secure the key






46. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






47. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






48. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






49. One is for talking - one is for implementing






50. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found