Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






2. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






3. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






4. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






5. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


6. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






7. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






8. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






9. Stateful firewalls maintain state of traffic flows






10. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






11. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






12. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host






13. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






14. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside






15. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






16. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






17. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






18. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis






19. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535






20. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0






21. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






22. It makes sure the data sent from one side to the other is in a format useful to the other side






23. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






24. Bits of code embedded in programs to quickly gain access at a later time






25. Protected at rest - protected in transit - secure the key






26. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






27. Handles transmissions across the physical media like wires - fiber - etc






28. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






29. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application






30. Provides insight into the tactics - motives - and attacker tools






31. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






32. Intellectual property - business goals - validated data - historical






33. destruction of data - leaking confidential information - providing backdoor access






34. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






35. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






36. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






37. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit






38. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched






39. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


40. Syn - Syn/Ack - Ack






41. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






42. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






43. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network






44. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






45. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






46. Relies on executable code insertion and user interaction to spread






47. Considered to be a perimeter device






48. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






49. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






50. One is for talking - one is for implementing