Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






2. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






3. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






4. Personal area network - phone tethering - bluetooth - etc






5. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall






6. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






7. Full open - half open (stealth scan) - UDP - Ping






8. FIN 130 - ACK 131 - FIN 570 - ACK 571






9. Unified data carrying service - replacing from replay and ATM






10. An attempt to gain access by bombarding it with guesses until the password is found.






11. Intrusion detection system - it reports attacks against monitored systems/networks






12. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






13. fast - with little fidelity - examines header information and limited payload data






14. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






15. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






16. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






17. Intellectual property - business goals - validated data - historical






18. Syn - Syn/Ack - Ack






19. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






20. 53 bytes - 48 bytes for data - 5 bytes for the header






21. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






22. It handles the establishment and maintenance of connections between systems






23. Trying to ID modems in a telephone exchange that may be susceptible to compromise






24. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






25. Network scanner.






26. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






27. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






28. Uniform protection - protected enclaves - information centric - threat vector analysis






29. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






30. It makes sure the data sent from one side to the other is in a format useful to the other side






31. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






32. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






33. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






34. Confidentiality - symmetric encryption






35. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






36. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






37. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment






38. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






39. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






40. An FTP that allows downloads only if the user knows the exact name of the file they're looking for






41. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






42. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






43. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






44. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






45. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






46. A cracking tool inserted into the OS that allows the attacker to do as they please.






47. Stateful firewalls maintain state of traffic flows






48. Attaches itself to existing program files and activated when the exe is launched






49. Confidentiality - integrity - availability






50. Protected at rest - protected in transit - secure the key