SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
The difference in stacks
Logic bomb
The four types of events reported by IDS
Some network design objectives
2. Going around with equipment to detect wireless networks
Social engineering
The threat vector analysis in defense in depth
Wardriving
Rootkit
3. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Some network design objectives
Some common UDP ports
Some firewall benefits
Rootkit
4. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
Address resolution protocol
UDP packet headers
A network protocol
Defense in depth
5. One is for talking - one is for implementing
Ack Piggybacking
What ways should the crypto key be protected?
The difference in stacks
What range is a class B network?
6. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
Some FTP dangers
The goals of cryptography
The threat vector analysis in defense in depth
LAN
7. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Brute force
Some firewall challenges
Smurf attack
UDP packet headers
8. Relies on executable code insertion and user interaction to spread
UDP packet headers
Parasitic malware
Browsing attack
IDS
9. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
Snort
Nmap
Log monitoring work?
The different cable categories
10. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
The physical layer stack
The session layer
ATM work
The conficker worm
11. Personal area network - phone tethering - bluetooth - etc
Remote maintenance
The network layer
What threats should be protected against - based on threat levels
PAN
12. The practice of sending an ACK inside another packet going to the same destination
ACK piggybacking
Logic bomb
The different cable categories
Some honeypot advantages
13. Message in its encrypted form
EXE program infector
Total cell size for asynchronous transfer mode (ATM)
Ciphertext
Social engineering
14. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
IDS signature analysis work
Some network design objectives
The Information Centric defense in depth
Total cell size for asynchronous transfer mode (ATM)
15. It interacts with the application layer to determine which network services will be required
MAN
What range is a class C network?
Logic bomb
the application layer
16. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Multi protocol label switching
The CIA triad
Bridge
Snort
17. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
The difference in stacks
Vulnerabilities
A netcat listener
Some other UDP based protocols
18. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
The transport layer
Switches
Buffer overflow
Types of viruses
19. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
SYN flood
Switches
LAN
A network protocol
20. True positive - false positive - true negative - false negative
Buffer overflow
Kismet
The four types of events reported by IDS
Shallow packet inspection
21. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
Some reasons to use TCP over UDP
Honeyd
The four types of events reported by IDS
22. An attempt to gain access by bombarding it with guesses until the password is found.
Brute force
Proxy or application gateway
Some types of malicious code
Alteration of code
23. Handles transmissions across the physical media like wires - fiber - etc
No State Inspection ACK flag set
Plaintext
Some Pen Test techniques
The physical layer stack
24. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
The four basic approaches to defense in depth
Remote maintenance
NIDS challenges
To close a TCP session
25. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
SYN flood
3-way handshake
Anomaly analysis work
Parasitic malware
26. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Overview of TCP
The CIA triad
Address Resolution Protocol (ARP)
File integrity checking work
27. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
HIDS monitor
WAN
Total cell size for asynchronous transfer mode (ATM)
No State Inspection ACK flag set
28. Provides insight into the tactics - motives - and attacker tools
A netcat listener
Macro virus
The OSI model
Some honeypot advantages
29. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Risk
IDS data normalization
What primary threats should be protected against
Log monitoring work?
30. Bits of code embedded in programs to quickly gain access at a later time
Port scan
Defense in depth
Trap door
What range is a class A network?
31. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
COM/Script program infector
Some honeypot advantages
The protected enclave to defense in depth
Nmap
32. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
Firewall
What categories do vulnerabilities fall into?
UDP packet headers
33. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
Vulnerabilities
Buffer overflow
Multi protocol label switching
Some firewall challenges
34. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
The Uniform Protection to defense in depth
The conficker worm
Stateless packet filter
the application layer
35. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
EXE program infector
Bus Topology
Social engineering
OS Command Injection defenses
36. It makes sure the data sent from one side to the other is in a format useful to the other side
Permutation
The presentation layer
The Uniform Protection to defense in depth
Internet
37. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Arbitrary substitution
Total cell size for asynchronous transfer mode (ATM)
Some malware propagation techniques
Address resolution protocol
38. Full open - half open (stealth scan) - UDP - Ping
Vulnerabilities
Some other UDP based protocols
The different cable categories
Nmap scanning techniques
39. The Practice of sending an ACK inside another packet going to the same destination
Wardriving
Ack Piggybacking
NIDS challenges
Worms
40. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
WAN
The OSI model
File integrity checking work
Some reasons to use TCP over UDP
41. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. Considered to be a perimeter device
Trap door
Datagram length of a UDP packet
ACK piggybacking
Router
43. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
What primary threats should be protected against
IDS signature analysis work
The OSI model
Nmap
44. Unified data carrying service - replacing from replay and ATM
Alteration of code
Port scan
What range is a class C network?
Multi protocol label switching
45. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
COM/Script program infector
Risk
Some reasons to use UDP over TCP
To close a TCP session
46. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Some FTP dangers
NIDS advantages
Switches
OS Command Injection defenses
47. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Switches
Nmap
Address Resolution Protocol (ARP)
MAN
48. fast - with little fidelity - examines header information and limited payload data
Bridge
Ack Piggybacking
File integrity checking work
Shallow packet inspection
49. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Some common UDP ports
Some network design objectives
Some malware propagation techniques
Brute force
50. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
NAC
Some external threat concerns
IDS
Hping