Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






2. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






3. logic bomb - trojan horse - trap door






4. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






5. Going around with equipment to detect wireless networks






6. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0






7. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






8. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






9. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






10. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.






11. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






12. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






13. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






14. Infects MBR - no network spreading potential






15. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






16. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






17. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






18. The Practice of sending an ACK inside another packet going to the same destination






19. fast - with little fidelity - examines header information and limited payload data






20. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






21. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






22. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






23. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






24. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






25. Simple attack done by simply browsing available information that's allowed on a local network.






26. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






27. Provides insight into the tactics - motives - and attacker tools






28. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






29. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






30. A cracking tool inserted into the OS that allows the attacker to do as they please.






31. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






32. One is for talking - one is for implementing






33. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






34. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






35. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






36. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






37. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






38. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






39. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






40. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






41. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






42. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






43. Message in its encrypted form






44. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






45. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






46. The practice of sending an ACK inside another packet going to the same destination






47. Confidentiality - integrity - availability






48. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






49. Syn - Syn/Ack - Ack






50. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has