Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Handles transmissions across the physical media like wires - fiber - etc






2. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






3. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






4. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






5. The Practice of sending an ACK inside another packet going to the same destination






6. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






7. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






8. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






9. Known - unknown - zero day






10. Uniform protection - protected enclaves - information centric - threat vector analysis






11. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






12. It handles the establishment and maintenance of connections between systems






13. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






14. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






15. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






16. Network scanner.






17. Confidentiality - symmetric encryption






18. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside






19. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






20. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector






21. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






22. The practice of sending an ACK inside another packet going to the same destination






23. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






24. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






25. OSI






26. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






27. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






28. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






29. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






30. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






31. Connects many WANs - MANs - and LANs - provided via ISP






32. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






33. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






34. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






35. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






36. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






37. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






38. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies






39. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






40. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






41. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






42. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






43. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS






44. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






46. Full open - half open (stealth scan) - UDP - Ping






47. Considered to be a perimeter device






48. True positive - false positive - true negative - false negative






49. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






50. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority