Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






2. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






3. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






4. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






5. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






6. Confidentiality - symmetric encryption






7. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






8. Message in its encrypted form






9. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






10. Stateful firewalls maintain state of traffic flows






11. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






12. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






13. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






14. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






15. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside






16. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.






17. Unified data carrying service - replacing from replay and ATM






18. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network






19. Going around with equipment to detect wireless networks






20. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






21. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






22. It interacts with the application layer to determine which network services will be required






23. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






24. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






25. Known - unknown - zero day






26. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






27. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






28. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






29. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






30. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






31. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.






32. Considered to be a perimeter device






33. One is for talking - one is for implementing






34. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






35. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






36. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector






37. Trying to ID modems in a telephone exchange that may be susceptible to compromise






38. fast - with little fidelity - examines header information and limited payload data






39. logic bomb - trojan horse - trap door






40. Intrusion detection system - it reports attacks against monitored systems/networks






41. FIN 130 - ACK 131 - FIN 570 - ACK 571






42. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0






43. Uniform protection - protected enclaves - information centric - threat vector analysis






44. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






45. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit






46. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






47. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






48. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






49. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






50. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.