Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides insight into the tactics - motives - and attacker tools






2. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






3. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






4. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






5. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






6. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network






7. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






8. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






9. The practice of sending an ACK inside another packet going to the same destination






10. Trying to ID modems in a telephone exchange that may be susceptible to compromise






11. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






12. It makes sure the data sent from one side to the other is in a format useful to the other side






13. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0






14. Infects MBR - no network spreading potential






15. Unencrypted message in its original form






16. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






17. Protected at rest - protected in transit - secure the key






18. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






19. Syn - Syn/Ack - Ack






20. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired






21. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application






22. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






23. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.






24. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






25. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. It handles the establishment and maintenance of connections between systems






27. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






28. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






29. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






30. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






31. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies






32. Simple attack done by simply browsing available information that's allowed on a local network.






33. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector






34. An attempt to gain access by bombarding it with guesses until the password is found.






35. Bits of code embedded in programs to quickly gain access at a later time






36. OSI






37. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






38. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






39. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






40. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535






41. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






42. Known - unknown - zero day






43. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






44. Malware - insider threat - natural disaster - terrorism - pandemic






45. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






46. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






47. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






48. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






49. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






50. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.