Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Handles the network address scheme and connectivity of multiple network segments. It handles communication.






2. Confidentiality - symmetric encryption






3. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols






4. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies






5. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






6. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere






7. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






8. Connects the physical part of the network (cables) with the abstract (packets and datastreams)






9. Known - unknown - zero day






10. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector






11. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored






12. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted






13. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host






14. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK






15. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection






16. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






17. Considered to be a perimeter device






18. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






19. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit






20. Full open - half open (stealth scan) - UDP - Ping






21. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above






22. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






23. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has






24. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS






25. FIN 130 - ACK 131 - FIN 570 - ACK 571






26. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority






27. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management






28. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0






29. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules






30. It makes sure the data sent from one side to the other is in a format useful to the other side






31. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0






32. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched






33. Confidentiality - integrity - availability






34. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






35. True positive - false positive - true negative - false negative






36. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive






37. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






38. Bits of code embedded in programs to quickly gain access at a later time






39. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks






40. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






41. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area






42. Relies on executable code insertion and user interaction to spread






43. Confidentiality - integrity - availability






44. Trying to ID modems in a telephone exchange that may be susceptible to compromise






45. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






46. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment






47. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.






48. Connects many WANs - MANs - and LANs - provided via ISP






49. Syn - Syn/Ack - Ack






50. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.