Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. It makes sure the data sent from one side to the other is in a format useful to the other side






2. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






3. fast - with little fidelity - examines header information and limited payload data






4. An attempt to gain access by bombarding it with guesses until the password is found.






5. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






6. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






7. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






8. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired






9. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






10. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






11. Handles transmissions across the physical media like wires - fiber - etc






12. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






13. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






14. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






15. A cracking tool inserted into the OS that allows the attacker to do as they please.






16. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






17. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






18. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






19. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






20. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






21. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






22. Network scanner.






23. Simple attack done by simply browsing available information that's allowed on a local network.






24. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






25. FIN 130 - ACK 131 - FIN 570 - ACK 571






26. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


27. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






28. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS






29. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






30. Considered to be a perimeter device






31. destruction of data - leaking confidential information - providing backdoor access






32. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






33. The Practice of sending an ACK inside another packet going to the same destination






34. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






35. Intrusion detection system - it reports attacks against monitored systems/networks






36. Infects MBR - no network spreading potential






37. It handles the establishment and maintenance of connections between systems






38. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






39. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






40. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






41. One is for talking - one is for implementing






42. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






43. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






44. Uniform protection - protected enclaves - information centric - threat vector analysis






45. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






46. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






47. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






48. The practice of sending an ACK inside another packet going to the same destination






49. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored






50. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers