Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






2. FIN 130 - ACK 131 - FIN 570 - ACK 571






3. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






4. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






5. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






6. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






7. Intrusion detection system - it reports attacks against monitored systems/networks






8. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






9. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






10. Uniform protection - protected enclaves - information centric - threat vector analysis






11. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host






12. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






13. destruction of data - leaking confidential information - providing backdoor access






14. The Practice of sending an ACK inside another packet going to the same destination






15. OSI






16. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






17. Confidentiality - integrity - availability






18. Intellectual property - business goals - validated data - historical






19. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






20. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






21. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






22. Malware - insider threat - natural disaster - terrorism - pandemic






23. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


24. logic bomb - trojan horse - trap door






25. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.






26. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






27. Confidentiality - symmetric encryption






28. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






29. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






30. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






31. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






32. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






33. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






34. Bits of code embedded in programs to quickly gain access at a later time






35. Going around with equipment to detect wireless networks






36. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






37. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






38. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






39. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






40. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






41. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






42. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






43. Relies on executable code insertion and user interaction to spread






44. It handles the establishment and maintenance of connections between systems






45. Unencrypted message in its original form






46. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






47. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






48. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






49. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






50. fast - with little fidelity - examines header information and limited payload data