Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






3. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






4. Unencrypted message in its original form






5. Attaches itself to existing program files and activated when the exe is launched






6. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






7. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






8. It interacts with the application layer to determine which network services will be required






9. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched






10. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






11. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






12. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






13. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






14. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






15. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script






16. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






17. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






18. Malware - insider threat - natural disaster - terrorism - pandemic






19. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






20. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






21. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






22. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






23. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network






24. Relies on executable code insertion and user interaction to spread






25. 53 bytes - 48 bytes for data - 5 bytes for the header






26. It handles the establishment and maintenance of connections between systems






27. destruction of data - leaking confidential information - providing backdoor access






28. Personal area network - phone tethering - bluetooth - etc






29. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






30. fast - with little fidelity - examines header information and limited payload data






31. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






32. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






33. An FTP that allows downloads only if the user knows the exact name of the file they're looking for






34. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






35. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






36. Infects MBR - no network spreading potential






37. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


38. An attempt to gain access by bombarding it with guesses until the password is found.






39. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






40. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






41. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.






42. Intrusion detection system - it reports attacks against monitored systems/networks






43. Unified data carrying service - replacing from replay and ATM






44. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






45. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






46. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






47. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector






48. Protected at rest - protected in transit - secure the key






49. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






50. Message in its encrypted form