Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






2. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






3. Attaches itself to existing program files and activated when the exe is launched






4. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






5. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored






6. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host






7. Stateful firewalls maintain state of traffic flows






8. Going around with equipment to detect wireless networks






9. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall






10. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






11. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






12. logic bomb - trojan horse - trap door






13. One is for talking - one is for implementing






14. True positive - false positive - true negative - false negative






15. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






16. Full open - half open (stealth scan) - UDP - Ping






17. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






18. Syn - Syn/Ack - Ack






19. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






20. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment






21. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






22. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.






23. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






24. Network scanner.






25. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






27. A cracking tool inserted into the OS that allows the attacker to do as they please.






28. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






29. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired






30. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






31. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






32. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






33. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0






34. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






35. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






36. Confidentiality - integrity - availability






37. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






38. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






39. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






40. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






41. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






42. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






43. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






44. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






45. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






46. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






47. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






48. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






49. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






50. Malware - insider threat - natural disaster - terrorism - pandemic







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests