SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Buffer overflow
WAN
The CIA triad
Smurf attack
2. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
A network protocol
Port scan
NAC
Denial of service
3. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
The difference in stacks
Log monitoring work?
Arbitrary substitution
IDS signature analysis work
4. Relies on executable code insertion and user interaction to spread
Some NIDS topology limitations
Parasitic malware
Some types of malicious code
Deep packet inspection
5. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
Smurf attack
Bridge
COM/Script program infector
The network layer
6. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
The OSI Protocol Stack
Boot record infector
Network stumbler
CIDR
7. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
The presentation layer
3-way handshake
SYN flood
What's an easy way to test encryption?
8. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Logic bomb
Rotation?
Honeypot
The different cable categories
9. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Some other UDP based protocols
What range is a class C network?
Some reasons to use TCP over UDP
A network protocol
11. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Worms
Multi protocol label switching
IDS data normalization
Race conditions
12. Known - unknown - zero day
What categories do vulnerabilities fall into?
When implementing protocols - what stack should be used?
Worms
Brute force
13. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
SYN flood
IDS signature analysis work
IDS
File Integrity checking work
14. True positive - false positive - true negative - false negative
EXE program infector
Worms
Address Resolution Protocol (ARP)
The four types of events reported by IDS
15. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Some network design objectives
Multi protocol label switching
MAN
No State Inspection ACK flag set
16. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
The different cable categories
Anomaly analysis work
Types of ATM virtual circuits
Nmap
17. Intrusion detection system - it reports attacks against monitored systems/networks
Social engineering
What ways should the crypto key be protected?
Brute force
IDS
18. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Switches
the application layer
Permutation
Ack Piggybacking
19. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some NIDS topology limitations
Hubs
Stateful firewall
Macro virus
21. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
War Dialing
What range is a class B network?
A netmask
22. Malware - insider threat - natural disaster - terrorism - pandemic
What primary threats should be protected against
Stateless packet filter
The OSI model
UDP packet headers
23. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
SQL Slammer Worm
TFTP
Remote maintenance
3-way handshake
24. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Bus Topology
Nmap scanning techniques
No State Inspection ACK flag set
Port scan
25. Confidentiality - integrity - availability
The three goals of security
3-way handshake
Address Resolution Protocol (ARP)
The TCP/IP model
26. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
The session layer
Buffer overflow
Some types of malicious code
Network stumbler
27. Protected at rest - protected in transit - secure the key
What ways should the crypto key be protected?
Some ways to bypass firewall protections
To establish a TCP session
Overview of TCP
28. Message in its encrypted form
No State Inspection ACK flag set
Hubs
What threats should be protected against - based on threat levels
Ciphertext
29. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
What's a VLAN
Hubs
The Information Centric defense in depth
3-way handshake
30. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
The OSI model
Social engineering
Integrity of Data
When implementing protocols - what stack should be used?
31. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
COM/Script program infector
Brute force
OS Command Injection defenses
Worms
32. Confidentiality - integrity - availability
Best way to protect wireless networks
The CIA triad
Types of ATM virtual circuits
File integrity checking work
33. OSI
Boot record infector
When talking about protocols and referencing layers - what stack is used
Group
Rotation?
34. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Permutation
Deep packet inspection
Rootkit
NIDS advantages
35. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Deep packet inspection
NIDS advantages
Hping
The threat vector analysis in defense in depth
36. It interacts with the application layer to determine which network services will be required
WAN
Ciphertext
the application layer
3-way handshake
37. The Practice of sending an ACK inside another packet going to the same destination
Nmap
NAC
Ack Piggybacking
Datagram length of a UDP packet
38. Trying to ID modems in a telephone exchange that may be susceptible to compromise
LAN
War Dialing
Trap door
The physical layer stack
39. Going around with equipment to detect wireless networks
Social engineering
The Uniform Protection to defense in depth
Log monitoring work?
Wardriving
40. The practice of sending an ACK inside another packet going to the same destination
Worms
ATM work
ACK piggybacking
Some ways to bypass firewall protections
41. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
Honeypot
Switches
Router
The conficker worm
42. It handles the establishment and maintenance of connections between systems
The session layer
Total cell size for asynchronous transfer mode (ATM)
Address Resolution Protocol (ARP)
What's an easy way to test encryption?
43. Network scanner.
Asynchronous Transfer Mode
Integrity of Data
Nmap
TFTP
44. FIN 130 - ACK 131 - FIN 570 - ACK 571
To close a TCP session
Trojan horse
Total cell size for asynchronous transfer mode (ATM)
Ack Piggybacking
45. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Smurf attack
Datagram length of a UDP packet
What primary threats should be protected against
Alteration of code
46. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Stateful firewall
Trojan horse
A netmask
Some firewall benefits
47. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
The three goals of security
Datagram length of a UDP packet
The Uniform Protection to defense in depth
Some other UDP based protocols
48. Stateful firewalls maintain state of traffic flows
Some disadvantages of honeypots
The threat vector analysis in defense in depth
Stateful firewall
To establish a TCP session
49. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Shallow packet inspection
Some common UDP ports
ATM work
To close a TCP session
50. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Some firewall benefits
COM/Script program infector
The conficker worm
Denial of service