Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






2. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall






3. Unified data carrying service - replacing from replay and ATM






4. logic bomb - trojan horse - trap door






5. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






6. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






7. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






8. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






9. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






10. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






11. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






12. Unencrypted message in its original form






13. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






14. It interacts with the application layer to determine which network services will be required






15. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






16. Intrusion detection system - it reports attacks against monitored systems/networks






17. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






18. Handles transmissions across the physical media like wires - fiber - etc






19. Provides insight into the tactics - motives - and attacker tools






20. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






21. The practice of sending an ACK inside another packet going to the same destination






22. Full open - half open (stealth scan) - UDP - Ping






23. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






24. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched






25. Personal area network - phone tethering - bluetooth - etc






26. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






27. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






28. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






29. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






30. Connects many WANs - MANs - and LANs - provided via ISP






31. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






32. Simple attack done by simply browsing available information that's allowed on a local network.






33. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






34. Stateful firewalls maintain state of traffic flows






35. Trying to ID modems in a telephone exchange that may be susceptible to compromise






36. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






37. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






38. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






39. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






40. Confidentiality - symmetric encryption






41. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






42. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






43. Network scanner.






44. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






45. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






46. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






47. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






48. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






49. OSI






50. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code