Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in






2. destruction of data - leaking confidential information - providing backdoor access






3. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






4. Unified data carrying service - replacing from replay and ATM






5. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






6. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






7. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested






8. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






9. Personal area network - phone tethering - bluetooth - etc






10. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






11. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability






12. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis






13. Connects many WANs - MANs - and LANs - provided via ISP






14. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






15. A cracking tool inserted into the OS that allows the attacker to do as they please.






16. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.






17. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP






18. Intellectual property - business goals - validated data - historical






19. Syn - Syn/Ack - Ack






20. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum






21. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






22. Trying to ID modems in a telephone exchange that may be susceptible to compromise






23. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP






24. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application






25. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






26. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches






27. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis






28. 53 bytes - 48 bytes for data - 5 bytes for the header






29. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






30. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






31. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






32. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks






33. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.






34. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






35. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.






36. fast - with little fidelity - examines header information and limited payload data






37. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.






38. Confidentiality - integrity - availability






39. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks






40. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






41. Infects MBR - no network spreading potential






42. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






43. Going around with equipment to detect wireless networks






44. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






45. Known - unknown - zero day






46. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






47. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs






49. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






50. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key