Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit






2. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script






3. An attempt to gain access by bombarding it with guesses until the password is found.






4. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






5. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






6. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment






7. Unencrypted message in its original form






8. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






9. Handles transmissions across the physical media like wires - fiber - etc






10. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






11. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






12. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






13. Relies on executable code insertion and user interaction to spread






14. Provides insight into the tactics - motives - and attacker tools






15. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.






16. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






17. OSI






18. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






19. The practice of sending an ACK inside another packet going to the same destination






20. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis






21. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application






22. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






23. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






24. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






25. fast - with little fidelity - examines header information and limited payload data






26. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






27. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






28. Uniform protection - protected enclaves - information centric - threat vector analysis






29. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






30. Attaches itself to existing program files and activated when the exe is launched






31. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






32. Full open - half open (stealth scan) - UDP - Ping






33. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






34. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






35. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






36. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






37. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






38. It makes sure the data sent from one side to the other is in a format useful to the other side






39. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






40. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






41. Malware - insider threat - natural disaster - terrorism - pandemic






42. True positive - false positive - true negative - false negative






43. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






44. Personal area network - phone tethering - bluetooth - etc






45. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






46. Intellectual property - business goals - validated data - historical






47. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






48. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






49. Stateful firewalls maintain state of traffic flows






50. Unified data carrying service - replacing from replay and ATM