SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
Switches
The OSI Protocol Stack
NAC
The conficker worm
2. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
To establish a TCP session
A netcat listener
NIDS advantages
Vulnerabilities
3. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
The Information Centric defense in depth
HIDS monitor
The four types of events reported by IDS
Anomaly analysis work
4. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
To establish a TCP session
Snort
Race conditions
Defense in depth
5. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
The network layer
The threat vector analysis in defense in depth
Port scan
Vulnerabilities
7. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
SYN flood
Boot record infector
Checksum in UDP
Hping
8. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Hping
3-way handshake
Some firewall benefits
Some malware propagation techniques
9. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
What range is a class A network?
Wardriving
The three goals of security
Bus Topology
10. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
The network layer
Trap door
Some reasons to use TCP over UDP
IDS data normalization
12. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
The goals of cryptography
Race conditions
Deep packet inspection
Rotation?
13. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
COM/Script program infector
Types of ATM virtual circuits
Address resolution protocol
Group
14. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Proxy or application gateway
Buffer overflow
Smurf attack
Denial of service
15. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Logic bomb
OS Command Injection defenses
Honeyd
Some ways to bypass firewall protections
16. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Denial of service
Bus Topology
Stateful firewall
Some Pen Test techniques
17. Provides insight into the tactics - motives - and attacker tools
Some honeypot advantages
When talking about protocols and referencing layers - what stack is used
The Uniform Protection to defense in depth
The protected enclave to defense in depth
18. Unified data carrying service - replacing from replay and ATM
Nmap scanning techniques
Hping
Multi protocol label switching
Some Pen Test techniques
19. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Browsing attack
Some firewall benefits
Log monitoring work?
Stateless packet filter
20. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Types of ATM virtual circuits
Router
The presentation layer
Some types of malicious code
21. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
The OSI model
The different cable categories
SYN flood
Risk
22. True positive - false positive - true negative - false negative
NAC
Some common TCP ports
What ways should the crypto key be protected?
The four types of events reported by IDS
23. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
WAN
EXE program infector
What range is a class B network?
Address Resolution Protocol (ARP)
24. A cracking tool inserted into the OS that allows the attacker to do as they please.
Address Resolution Protocol (ARP)
Rootkit
Hubs
A network protocol
25. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Denial of service
A netmask
Network stumbler
Nmap scanning techniques
26. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
the application layer
The conficker worm
Rotation?
A network protocol
27. The practice of sending an ACK inside another packet going to the same destination
ACK piggybacking
Some honeypot advantages
MAN
The OSI Protocol Stack
28. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
COM/Script program infector
What range is a class B network?
DDoS attack
IDS
29. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
Program infector
The Information Centric defense in depth
Risk
LAN
30. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
HIDS monitor
A netmask
EXE program infector
Parasitic malware
31. Infects MBR - no network spreading potential
Nmap
The protected enclave to defense in depth
When talking about protocols and referencing layers - what stack is used
Boot record infector
32. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Kismet
UDP packet headers
Types of ATM virtual circuits
Wardriving
33. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Total cell size for asynchronous transfer mode (ATM)
Asynchronous Transfer Mode
COM/Script program infector
Some honeypot advantages
34. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
What range is a class A network?
WAN
Total cell size for asynchronous transfer mode (ATM)
A network protocol
35. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Kismet
IDS signature analysis work
Wardriving
The protected enclave to defense in depth
36. OSI
A blind FTP
When talking about protocols and referencing layers - what stack is used
Firewall
IDS signature analysis work
37. Attaches itself to existing program files and activated when the exe is launched
The network layer
Program infector
Stateful firewall
TFTP
38. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
The OSI model
IDS data normalization
IDS not
Network stumbler
39. Malware - insider threat - natural disaster - terrorism - pandemic
Denial of service
Remote maintenance
What primary threats should be protected against
Alteration of code
40. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Types of viruses
Logic bomb
Some types of malicious code
NAC
41. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Shallow packet inspection
CIDR
Some network design objectives
42. Going around with equipment to detect wireless networks
War Dialing
Wardriving
TFTP
What's a VLAN
43. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Bridge
IDS not
Program infector
The transport layer
44. Simple attack done by simply browsing available information that's allowed on a local network.
Some common UDP ports
Trap door
Browsing attack
IDS data normalization
45. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
What ways should the crypto key be protected?
Stateless packet filter
What threats should be protected against - based on threat levels
Address Resolution Protocol (ARP)
46. Handles transmissions across the physical media like wires - fiber - etc
The TCP/IP model
The five threat vectors
the application layer
The physical layer stack
47. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
WAN
Bus Topology
COM/Script program infector
Some disadvantages of honeypots
48. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
The goals of cryptography
To close a TCP session
Overview of TCP
The transport layer
49. The Practice of sending an ACK inside another packet going to the same destination
Bus Topology
Total cell size for asynchronous transfer mode (ATM)
The five threat vectors
Ack Piggybacking
50. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
Anomaly analysis work
Some reasons to use UDP over TCP
Some common UDP ports
Kismet
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests