Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






3. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






4. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535






5. Considered to be a perimeter device






6. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






7. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






8. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






9. Confidentiality - integrity - availability






10. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






11. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






12. Trying to ID modems in a telephone exchange that may be susceptible to compromise






13. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside






14. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






15. True positive - false positive - true negative - false negative






16. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






17. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






18. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






19. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






20. Confidentiality - symmetric encryption






21. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






22. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






23. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






24. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






25. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






26. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






27. Attaches itself to existing program files and activated when the exe is launched






28. Malware - insider threat - natural disaster - terrorism - pandemic






29. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






30. Known - unknown - zero day






31. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






32. Stateful firewalls maintain state of traffic flows






33. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






34. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






35. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS






36. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






37. Relies on executable code insertion and user interaction to spread






38. Syn - Syn/Ack - Ack






39. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






40. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






41. It makes sure the data sent from one side to the other is in a format useful to the other side






42. The practice of sending an ACK inside another packet going to the same destination






43. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






44. Connects many WANs - MANs - and LANs - provided via ISP






45. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






46. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






47. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






48. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






49. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






50. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests