Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






2. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host






3. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






4. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






5. Full open - half open (stealth scan) - UDP - Ping






6. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






7. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






8. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






9. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






10. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






11. Unified data carrying service - replacing from replay and ATM






12. Handles transmissions across the physical media like wires - fiber - etc






13. Personal area network - phone tethering - bluetooth - etc






14. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






15. Connects many WANs - MANs - and LANs - provided via ISP






16. destruction of data - leaking confidential information - providing backdoor access






17. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network






18. Intrusion detection system - it reports attacks against monitored systems/networks






19. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies






20. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






21. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






22. Trying to ID modems in a telephone exchange that may be susceptible to compromise






23. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






24. It makes sure the data sent from one side to the other is in a format useful to the other side






25. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






26. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






27. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






28. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






29. Confidentiality - integrity - availability






30. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






31. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






32. OSI






33. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






34. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






35. Considered to be a perimeter device






36. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






37. Attaches itself to existing program files and activated when the exe is launched






38. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script






39. Confidentiality - integrity - availability






40. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






41. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






43. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






44. Stateful firewalls maintain state of traffic flows






45. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






46. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






47. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






48. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched






49. Network scanner.






50. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests