Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script






2. FIN 130 - ACK 131 - FIN 570 - ACK 571






3. The Practice of sending an ACK inside another packet going to the same destination






4. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






5. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






6. Confidentiality - symmetric encryption






7. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






8. Uniform protection - protected enclaves - information centric - threat vector analysis






9. Considered to be a perimeter device






10. An attempt to gain access by bombarding it with guesses until the password is found.






11. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






12. Provides insight into the tactics - motives - and attacker tools






13. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






14. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


15. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






16. Unified data carrying service - replacing from replay and ATM






17. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application






18. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






19. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






20. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






21. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






22. Trying to ID modems in a telephone exchange that may be susceptible to compromise






23. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






24. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






25. True positive - false positive - true negative - false negative






26. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






27. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






28. Confidentiality - integrity - availability






29. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






30. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






31. One is for talking - one is for implementing






32. 53 bytes - 48 bytes for data - 5 bytes for the header






33. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






34. Malware - insider threat - natural disaster - terrorism - pandemic






35. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network






36. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






37. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






38. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






39. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






40. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






41. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






42. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






43. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






44. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






45. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






46. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored






47. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






48. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






49. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535






50. Connects many WANs - MANs - and LANs - provided via ISP