Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host






2. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






3. Attaches itself to existing program files and activated when the exe is launched






4. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.






5. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






6. One is for talking - one is for implementing






7. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.






8. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






9. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






10. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






11. True positive - false positive - true negative - false negative






12. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






13. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0






14. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






15. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






16. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






17. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






18. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






19. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside






20. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






21. Unified data carrying service - replacing from replay and ATM






22. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






23. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






24. Unencrypted message in its original form






25. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






26. Going around with equipment to detect wireless networks






27. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






28. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






29. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






30. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






31. OSI






32. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






33. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






34. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






35. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






36. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis






37. Malware - insider threat - natural disaster - terrorism - pandemic






38. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






39. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






40. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






41. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






42. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall






43. logic bomb - trojan horse - trap door






44. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






45. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






46. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






47. An attempt to gain access by bombarding it with guesses until the password is found.






48. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment






49. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






50. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests