Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






2. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






3. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






4. Confidentiality - integrity - availability






5. The Practice of sending an ACK inside another packet going to the same destination






6. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






7. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






8. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






9. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host






10. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






11. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






12. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






13. The practice of sending an ACK inside another packet going to the same destination






14. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






15. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






16. True positive - false positive - true negative - false negative






17. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






18. Confidentiality - symmetric encryption






19. A cracking tool inserted into the OS that allows the attacker to do as they please.






20. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






21. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






22. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






23. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






24. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






25. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






26. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






27. Trying to ID modems in a telephone exchange that may be susceptible to compromise






28. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






29. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






30. Protected at rest - protected in transit - secure the key






31. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application






32. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






33. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






34. Confidentiality - integrity - availability






35. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






36. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






37. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






38. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






39. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






40. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






41. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






42. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






43. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






44. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. Uniform protection - protected enclaves - information centric - threat vector analysis






46. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






47. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.






48. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






49. Provides insight into the tactics - motives - and attacker tools






50. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet