Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Relies on executable code insertion and user interaction to spread






2. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script






3. Intellectual property - business goals - validated data - historical






4. Message in its encrypted form






5. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment






6. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






7. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






8. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






9. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






10. Considered to be a perimeter device






11. Infects MBR - no network spreading potential






12. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






13. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






14. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






15. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






16. OSI






17. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






18. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






19. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






20. Uniform protection - protected enclaves - information centric - threat vector analysis






21. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






22. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






23. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






24. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






25. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






26. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis






27. Personal area network - phone tethering - bluetooth - etc






28. destruction of data - leaking confidential information - providing backdoor access






29. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


30. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






31. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






32. Intrusion detection system - it reports attacks against monitored systems/networks






33. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






34. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






35. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






36. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






37. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






38. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






39. The Practice of sending an ACK inside another packet going to the same destination






40. 53 bytes - 48 bytes for data - 5 bytes for the header






41. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






42. Confidentiality - symmetric encryption






43. It interacts with the application layer to determine which network services will be required






44. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






45. Provides insight into the tactics - motives - and attacker tools






46. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






47. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






48. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






49. An FTP that allows downloads only if the user knows the exact name of the file they're looking for






50. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK