Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






2. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






3. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






4. Unencrypted message in its original form






5. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






6. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.






7. Stateful firewalls maintain state of traffic flows






8. One is for talking - one is for implementing






9. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






10. Syn - Syn/Ack - Ack






11. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






12. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






13. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






14. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






15. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






16. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






17. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






18. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






19. Confidentiality - symmetric encryption






20. Full open - half open (stealth scan) - UDP - Ping






21. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






22. It interacts with the application layer to determine which network services will be required






23. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host






24. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script






25. Protected at rest - protected in transit - secure the key






26. Intellectual property - business goals - validated data - historical






27. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






28. destruction of data - leaking confidential information - providing backdoor access






29. Unified data carrying service - replacing from replay and ATM






30. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






31. Handles transmissions across the physical media like wires - fiber - etc






32. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






33. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






34. FIN 130 - ACK 131 - FIN 570 - ACK 571






35. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






36. 53 bytes - 48 bytes for data - 5 bytes for the header






37. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






38. Confidentiality - integrity - availability






39. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






40. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






41. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






42. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






43. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






44. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






45. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






46. Intrusion detection system - it reports attacks against monitored systems/networks






47. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






48. True positive - false positive - true negative - false negative






49. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






50. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network