Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






2. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






3. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






4. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






5. Known - unknown - zero day






6. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






7. Malware - insider threat - natural disaster - terrorism - pandemic






8. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






9. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






10. Full open - half open (stealth scan) - UDP - Ping






11. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






12. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






13. An attempt to gain access by bombarding it with guesses until the password is found.






14. A cracking tool inserted into the OS that allows the attacker to do as they please.






15. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






16. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






17. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






18. Handles transmissions across the physical media like wires - fiber - etc






19. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






20. Considered to be a perimeter device






21. Attaches itself to existing program files and activated when the exe is launched






22. Intrusion detection system - it reports attacks against monitored systems/networks






23. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






24. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






25. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






26. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






27. The Practice of sending an ACK inside another packet going to the same destination






28. Connects many WANs - MANs - and LANs - provided via ISP






29. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






30. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






31. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






32. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






33. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall






34. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






35. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.






36. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






37. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






38. Protected at rest - protected in transit - secure the key






39. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






40. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






41. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






42. Personal area network - phone tethering - bluetooth - etc






43. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.






44. It makes sure the data sent from one side to the other is in a format useful to the other side






45. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies






46. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application






47. Infects MBR - no network spreading potential






48. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






49. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






50. Confidentiality - symmetric encryption