Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce






2. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


3. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer






4. An attempt to gain access by bombarding it with guesses until the password is found.






5. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone






6. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed






7. Intellectual property - business goals - validated data - historical






8. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system






9. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script






10. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found






11. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port






12. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


13. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability






14. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom






15. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet






16. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored






17. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.






18. Uniform protection - protected enclaves - information centric - threat vector analysis






19. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address






20. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS






21. It interacts with the application layer to determine which network services will be required






22. Bits of code embedded in programs to quickly gain access at a later time






23. Intrusion detection system - it reports attacks against monitored systems/networks






24. Unencrypted message in its original form






25. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication






26. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system






27. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment






28. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment






29. Trying to ID modems in a telephone exchange that may be susceptible to compromise






30. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched






31. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end






32. Slow - requires stateful data tracking - inspects all fields - including variable-length fields






33. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer






34. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring






35. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key






36. Attaches itself to existing program files and activated when the exe is launched






37. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.






38. Infects MBR - no network spreading potential






39. An FTP that allows downloads only if the user knows the exact name of the file they're looking for






40. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters






41. fast - with little fidelity - examines header information and limited payload data






42. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline






43. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address






44. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input






45. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers






46. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code






47. Confidentiality - integrity - availability






48. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures






49. Syn - Syn/Ack - Ack






50. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself