Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






2. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






3. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






4. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






5. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






6. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






7. One is for talking - one is for implementing






8. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






9. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


10. Syn - Syn/Ack - Ack






11. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535






12. Full open - half open (stealth scan) - UDP - Ping






13. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






14. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






15. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






16. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






17. The Practice of sending an ACK inside another packet going to the same destination






18. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






19. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






20. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






21. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






22. Intellectual property - business goals - validated data - historical






23. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






24. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






25. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






26. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






27. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS






28. Uniform protection - protected enclaves - information centric - threat vector analysis






29. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0






30. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






31. fast - with little fidelity - examines header information and limited payload data






32. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






33. Provides insight into the tactics - motives - and attacker tools






34. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






35. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






36. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






37. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies






38. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






39. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






40. Unencrypted message in its original form






41. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






42. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






43. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






44. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






45. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






46. It interacts with the application layer to determine which network services will be required






47. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






48. Malware - insider threat - natural disaster - terrorism - pandemic






49. Bits of code embedded in programs to quickly gain access at a later time






50. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication