Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






2. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






3. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






4. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






5. Uniform protection - protected enclaves - information centric - threat vector analysis






6. Protected at rest - protected in transit - secure the key






7. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






8. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






9. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






10. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






11. Relies on executable code insertion and user interaction to spread






12. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






13. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






14. Intellectual property - business goals - validated data - historical






15. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






16. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched






17. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






18. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






19. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






20. Malware - insider threat - natural disaster - terrorism - pandemic






21. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


22. Unified data carrying service - replacing from replay and ATM






23. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.






24. 53 bytes - 48 bytes for data - 5 bytes for the header






25. destruction of data - leaking confidential information - providing backdoor access






26. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






27. It handles the establishment and maintenance of connections between systems






28. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






29. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






30. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






31. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.






32. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






33. Unencrypted message in its original form






34. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






35. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






36. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






37. Connects many WANs - MANs - and LANs - provided via ISP






38. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






39. Provides insight into the tactics - motives - and attacker tools






40. Known - unknown - zero day






41. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






42. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






43. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






44. Stateful firewalls maintain state of traffic flows






45. Confidentiality - integrity - availability






46. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.






47. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






48. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






49. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






50. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests