Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. fast - with little fidelity - examines header information and limited payload data






2. It handles the establishment and maintenance of connections between systems






3. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously






4. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.






5. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






6. Message in its encrypted form






7. Bits of code embedded in programs to quickly gain access at a later time






8. One is for talking - one is for implementing






9. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






10. OSI






11. Trying to ID modems in a telephone exchange that may be susceptible to compromise






12. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






13. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself






14. Connects many WANs - MANs - and LANs - provided via ISP






15. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies






16. Relies on executable code insertion and user interaction to spread






17. Intellectual property - business goals - validated data - historical






18. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






19. Known - unknown - zero day






20. It interacts with the application layer to determine which network services will be required






21. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






22. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






23. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






24. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






25. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute






26. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






27. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






28. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






29. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






30. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






31. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






32. It makes sure the data sent from one side to the other is in a format useful to the other side






33. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






34. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






35. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






36. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






38. Syn - Syn/Ack - Ack






39. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored






40. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






41. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.






42. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






43. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






44. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched






45. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs






46. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






47. Going around with equipment to detect wireless networks






48. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






49. Full open - half open (stealth scan) - UDP - Ping






50. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests