Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






2. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






3. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535






4. Confidentiality - integrity - availability






5. Syn - Syn/Ack - Ack






6. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






7. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






8. Handles transmissions across the physical media like wires - fiber - etc






9. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






10. destruction of data - leaking confidential information - providing backdoor access






11. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host






12. Protected at rest - protected in transit - secure the key






13. Relies on executable code insertion and user interaction to spread






14. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






15. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






16. A cracking tool inserted into the OS that allows the attacker to do as they please.






17. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






18. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






19. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






20. Provides insight into the tactics - motives - and attacker tools






21. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






22. The Practice of sending an ACK inside another packet going to the same destination






23. Malware - insider threat - natural disaster - terrorism - pandemic






24. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






25. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






26. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






27. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






28. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






29. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






30. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






31. An attempt to gain access by bombarding it with guesses until the password is found.






32. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






33. Stateful firewalls maintain state of traffic flows






34. logic bomb - trojan horse - trap door






35. Uniform protection - protected enclaves - information centric - threat vector analysis






36. One is for talking - one is for implementing






37. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






38. Unified data carrying service - replacing from replay and ATM






39. Connects many WANs - MANs - and LANs - provided via ISP






40. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






41. True positive - false positive - true negative - false negative






42. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






43. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






44. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






45. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






46. fast - with little fidelity - examines header information and limited payload data






47. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






48. Going around with equipment to detect wireless networks






49. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






50. Confidentiality - integrity - availability