Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired






2. Going around with equipment to detect wireless networks






3. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






4. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






5. One is for talking - one is for implementing






6. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






7. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






8. Relies on executable code insertion and user interaction to spread






9. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit






10. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script






11. Personal area network - phone tethering - bluetooth - etc






12. The practice of sending an ACK inside another packet going to the same destination






13. Message in its encrypted form






14. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






15. It interacts with the application layer to determine which network services will be required






16. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






17. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






18. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






19. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






20. True positive - false positive - true negative - false negative






21. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






22. An attempt to gain access by bombarding it with guesses until the password is found.






23. Handles transmissions across the physical media like wires - fiber - etc






24. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






25. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






26. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






27. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






28. Provides insight into the tactics - motives - and attacker tools






29. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






30. Bits of code embedded in programs to quickly gain access at a later time






31. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






32. An FTP that allows downloads only if the user knows the exact name of the file they're looking for






33. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






34. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






35. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside






36. It makes sure the data sent from one side to the other is in a format useful to the other side






37. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






38. Full open - half open (stealth scan) - UDP - Ping






39. The Practice of sending an ACK inside another packet going to the same destination






40. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






41. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. Considered to be a perimeter device






43. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






44. Unified data carrying service - replacing from replay and ATM






45. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






46. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall






47. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






48. fast - with little fidelity - examines header information and limited payload data






49. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






50. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously