Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






2. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






3. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






4. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






5. It interacts with the application layer to determine which network services will be required






6. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






7. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






8. Going around with equipment to detect wireless networks






9. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






10. The Practice of sending an ACK inside another packet going to the same destination






11. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






12. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






13. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






14. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






15. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






16. Intellectual property - business goals - validated data - historical






17. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


18. One is for talking - one is for implementing






19. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






20. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






21. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535






22. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






23. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






24. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






25. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






26. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






27. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






28. Confidentiality - integrity - availability






29. Protected at rest - protected in transit - secure the key






30. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






31. Attaches itself to existing program files and activated when the exe is launched






32. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






33. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






34. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






35. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






36. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






37. Message in its encrypted form






38. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






39. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






40. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






41. Simple attack done by simply browsing available information that's allowed on a local network.






42. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






43. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






44. True positive - false positive - true negative - false negative






45. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies






46. logic bomb - trojan horse - trap door






47. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






48. Considered to be a perimeter device






49. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






50. Slow - requires stateful data tracking - inspects all fields - including variable-length fields