Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






2. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






3. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS






4. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






5. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






6. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies






7. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






8. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






9. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






10. Confidentiality - symmetric encryption






11. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






12. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






13. Uniform protection - protected enclaves - information centric - threat vector analysis






14. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






15. Simple attack done by simply browsing available information that's allowed on a local network.






16. Going around with equipment to detect wireless networks






17. It makes sure the data sent from one side to the other is in a format useful to the other side






18. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction






19. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






20. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






21. Provides insight into the tactics - motives - and attacker tools






22. Attaches itself to existing program files and activated when the exe is launched






23. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






24. Infects MBR - no network spreading potential






25. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






26. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






27. Confidentiality - integrity - availability






28. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






29. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






30. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit






31. Malware - insider threat - natural disaster - terrorism - pandemic






32. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






33. Unified data carrying service - replacing from replay and ATM






34. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






35. Network scanner.






36. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.






37. Message in its encrypted form






38. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


39. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






40. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






41. Known - unknown - zero day






42. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






43. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






44. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector






45. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






46. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






47. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






48. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






49. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






50. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests