Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






2. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






3. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con






4. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






5. It interacts with the application layer to determine which network services will be required






6. logic bomb - trojan horse - trap door






7. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






8. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






9. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network






10. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






11. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis






12. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






13. Infects MBR - no network spreading potential






14. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






15. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






16. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.






17. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


18. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






19. Considered to be a perimeter device






20. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






21. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






22. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






23. Unified data carrying service - replacing from replay and ATM






24. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






25. FIN 130 - ACK 131 - FIN 570 - ACK 571






26. A cracking tool inserted into the OS that allows the attacker to do as they please.






27. Confidentiality - integrity - availability






28. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector






29. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






30. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






31. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






32. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






33. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






34. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p






35. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside






36. Personal area network - phone tethering - bluetooth - etc






37. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






38. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






39. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






40. Confidentiality - symmetric encryption






41. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






42. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






43. Full open - half open (stealth scan) - UDP - Ping






44. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






45. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






46. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






47. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






48. Stateful firewalls maintain state of traffic flows






49. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






50. Going around with equipment to detect wireless networks