Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OSI






2. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






3. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired






4. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment






5. Full open - half open (stealth scan) - UDP - Ping






6. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






7. Stateful firewalls maintain state of traffic flows






8. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






9. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


10. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






11. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored






12. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






13. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






14. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






15. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






16. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






17. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






18. Considered to be a perimeter device






19. Unencrypted message in its original form






20. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






21. True positive - false positive - true negative - false negative






22. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.






23. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






24. One is for talking - one is for implementing






25. Intellectual property - business goals - validated data - historical






26. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






27. 53 bytes - 48 bytes for data - 5 bytes for the header






28. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






29. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall






30. Unified data carrying service - replacing from replay and ATM






31. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






32. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






33. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






34. Relies on executable code insertion and user interaction to spread






35. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






36. Bits of code embedded in programs to quickly gain access at a later time






37. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






38. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






39. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






40. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






41. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






42. Infects MBR - no network spreading potential






43. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






44. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside






45. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






46. Confidentiality - integrity - availability






47. Trying to ID modems in a telephone exchange that may be susceptible to compromise






48. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






49. An attempt to gain access by bombarding it with guesses until the password is found.






50. Simple attack done by simply browsing available information that's allowed on a local network.