Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






2. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis






3. Full open - half open (stealth scan) - UDP - Ping






4. Intellectual property - business goals - validated data - historical






5. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.






6. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






7. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






8. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






9. Connects many WANs - MANs - and LANs - provided via ISP






10. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






11. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






12. Simple attack done by simply browsing available information that's allowed on a local network.






13. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






14. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






15. Stateful firewalls maintain state of traffic flows






16. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






17. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






18. It handles the establishment and maintenance of connections between systems






19. Malware - insider threat - natural disaster - terrorism - pandemic






20. Syn - Syn/Ack - Ack






21. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






22. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






23. An attempt to gain access by bombarding it with guesses until the password is found.






24. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






25. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






26. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






27. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






28. Message in its encrypted form






29. OSI






30. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






31. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






32. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






33. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






34. Network scanner.






35. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






36. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






37. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






38. An FTP that allows downloads only if the user knows the exact name of the file they're looking for






39. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






40. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






41. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






42. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






43. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






44. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






45. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






46. Protected at rest - protected in transit - secure the key






47. logic bomb - trojan horse - trap door






48. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






49. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired






50. Known - unknown - zero day