SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OSI
Worms
When talking about protocols and referencing layers - what stack is used
The threat vector analysis in defense in depth
Ack Piggybacking
2. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Group
Some common UDP ports
Some firewall benefits
3. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Types of viruses
Risk
Firewall
The OSI Protocol Stack
4. Uniform protection - protected enclaves - information centric - threat vector analysis
IDS
Race conditions
The four basic approaches to defense in depth
Boot record infector
5. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Multi protocol label switching
Hping
Some firewall benefits
The different cable categories
6. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
MAN
Trojan horse
To establish a TCP session
7. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Denial of service
Firewall
Rotation?
Smurf attack
8. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Social engineering
The difference in stacks
Some other UDP based protocols
UDP packet headers
9. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
SQL Slammer Worm
A netcat listener
A netmask
Worms
10. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bridge
A network protocol
To close a TCP session
The data link layer
11. It makes sure the data sent from one side to the other is in a format useful to the other side
Shallow packet inspection
3-way handshake
The presentation layer
Address Resolution Protocol (ARP)
12. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
No State Inspection ACK flag set
Arbitrary substitution
A blind FTP
IDS
13. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
HIDS monitor
NAC
Checksum in UDP
Some disadvantages of honeypots
14. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
When talking about protocols and referencing layers - what stack is used
Alteration of code
SYN flood
NIDS advantages
15. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
A blind FTP
The conficker worm
Proxy or application gateway
Alteration of code
16. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Rotation?
The threat vector analysis in defense in depth
Network stumbler
When implementing protocols - what stack should be used?
17. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
IDS signature analysis work
Some common UDP ports
Kismet
Nmap
18. Syn - Syn/Ack - Ack
When talking about protocols and referencing layers - what stack is used
EXE program infector
To establish a TCP session
Deep packet inspection
19. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Asynchronous Transfer Mode
Trojan horse
Worms
Stateless packet filter
20. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
SYN flood
Logic bomb
Boot record infector
Bus Topology
21. Provides insight into the tactics - motives - and attacker tools
The network layer
Some honeypot advantages
Ciphertext
Parasitic malware
22. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
A network protocol
Address resolution protocol
Social engineering
The conficker worm
23. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Permutation
Nmap
Honeypot
The four basic approaches to defense in depth
24. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Types of viruses
PAN
Types of ATM virtual circuits
Macro virus
25. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
CIDR
Browsing attack
MAN
3-way handshake
26. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Types of viruses
Some reasons to use UDP over TCP
Best way to protect wireless networks
What's an easy way to test encryption?
27. Full open - half open (stealth scan) - UDP - Ping
Some firewall challenges
Nmap scanning techniques
Trap door
CIDR
28. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Ack Piggybacking
Honeyd
Denial of service
Asynchronous Transfer Mode
29. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
The TCP/IP model
Stateless packet filter
Social engineering
The four types of events reported by IDS
30. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
Some network design objectives
The TCP/IP model
Remote maintenance
Some honeypot advantages
32. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
MAN
Plaintext
Some Pen Test techniques
Defense in depth
33. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Buffer overflow
TFTP
Kismet
The threat vector analysis in defense in depth
34. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Race conditions
The threat vector analysis in defense in depth
Smurf attack
Defense in depth
35. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Switches
The goals of cryptography
Wardriving
3-way handshake
36. Malware - insider threat - natural disaster - terrorism - pandemic
Buffer overflow
3-way handshake
Stateless packet filter
What primary threats should be protected against
37. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Switches
Buffer overflow
3-way handshake
The threat vector analysis in defense in depth
38. Bits of code embedded in programs to quickly gain access at a later time
Group
The CIA triad
Trap door
The physical layer stack
39. Attaches itself to existing program files and activated when the exe is launched
Some reasons to use TCP over UDP
Program infector
Trojan horse
Network stumbler
40. Message in its encrypted form
IDS not
IDS signature analysis work
The four types of events reported by IDS
Ciphertext
41. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Logic bomb
What range is a class A network?
The Uniform Protection to defense in depth
Arbitrary substitution
42. Simple attack done by simply browsing available information that's allowed on a local network.
Browsing attack
What range is a class B network?
File integrity checking work
What threats should be protected against - based on threat levels
43. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Brute force
The OSI model
A netmask
The Uniform Protection to defense in depth
44. logic bomb - trojan horse - trap door
Trap door
Some types of malicious code
MAN
A netmask
45. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
The presentation layer
Some other UDP based protocols
Hubs
WAN
46. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The protected enclave to defense in depth
Hping
Remote maintenance
Some FTP dangers
47. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
The session layer
Bridge
Some firewall benefits
Some firewall challenges
48. FIN 130 - ACK 131 - FIN 570 - ACK 571
Stateful firewall
When talking about protocols and referencing layers - what stack is used
To close a TCP session
Macro virus
49. Going around with equipment to detect wireless networks
Asynchronous Transfer Mode
Honeypot
Some common UDP ports
Wardriving
50. Confidentiality - integrity - availability
Network stumbler
The three goals of security
The data link layer
What threats should be protected against - based on threat levels
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests