Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






2. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






3. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






4. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






5. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






6. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






7. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






8. Handles transmissions across the physical media like wires - fiber - etc






9. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






10. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network






11. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






12. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit






13. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






14. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






15. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






16. Syn - Syn/Ack - Ack






17. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






18. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






19. Confidentiality - integrity - availability






20. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






21. OSI






22. Attaches itself to existing program files and activated when the exe is launched






23. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






24. It interacts with the application layer to determine which network services will be required






25. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






26. logic bomb - trojan horse - trap door






27. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






28. It handles the establishment and maintenance of connections between systems






29. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






30. Network scanner.






31. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






32. Confidentiality - integrity - availability






33. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






34. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






35. Bits of code embedded in programs to quickly gain access at a later time






36. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0






37. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






38. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






39. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


40. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






41. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






42. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






43. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






44. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






45. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






46. A cracking tool inserted into the OS that allows the attacker to do as they please.






47. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall






48. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






49. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






50. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.