Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






2. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry






3. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering






4. Worms and Wireless - modems - tunnel anything through HTTP - social engineering






5. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






6. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired






7. The Practice of sending an ACK inside another packet going to the same destination






8. Intellectual property - business goals - validated data - historical






9. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






10. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire






11. Trying to ID modems in a telephone exchange that may be susceptible to compromise






12. One is for talking - one is for implementing






13. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






14. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest






15. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code






16. Going around with equipment to detect wireless networks






17. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






18. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls






19. Unified data carrying service - replacing from replay and ATM






20. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






21. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






22. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector






23. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.






24. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host






25. It interacts with the application layer to determine which network services will be required






26. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0






27. Full open - half open (stealth scan) - UDP - Ping






28. Handles transmissions across the physical media like wires - fiber - etc






29. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall






30. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process






31. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






32. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






33. 53 bytes - 48 bytes for data - 5 bytes for the header






34. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






35. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis






36. Confidentiality - symmetric encryption






37. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






38. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






39. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






40. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






41. Connects many WANs - MANs - and LANs - provided via ISP






42. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






43. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






44. Personal area network - phone tethering - bluetooth - etc






45. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit






46. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


47. Known - unknown - zero day






48. It handles the establishment and maintenance of connections between systems






49. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution






50. OSI