Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






2. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






3. It handles the establishment and maintenance of connections between systems






4. Protected at rest - protected in transit - secure the key






5. The Practice of sending an ACK inside another packet going to the same destination






6. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






7. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






8. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






9. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






10. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






11. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






12. Confidentiality - integrity - availability






13. Confidentiality - symmetric encryption






14. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






15. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






16. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






17. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






18. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






19. OSI






20. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






21. Handles transmissions across the physical media like wires - fiber - etc






22. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






23. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






24. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application






25. Attaches itself to existing program files and activated when the exe is launched






26. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






27. Stateful firewalls maintain state of traffic flows






28. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






29. Unencrypted message in its original form






30. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






31. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS






32. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






33. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






34. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






35. Relies on executable code insertion and user interaction to spread






36. Trying to ID modems in a telephone exchange that may be susceptible to compromise






37. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






38. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






39. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






40. Bits of code embedded in programs to quickly gain access at a later time






41. Uniform protection - protected enclaves - information centric - threat vector analysis






42. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






43. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






44. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector






45. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






46. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






47. Provides insight into the tactics - motives - and attacker tools






48. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






49. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit






50. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests