SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
What primary threats should be protected against
The data link layer
Program infector
2. It handles the establishment and maintenance of connections between systems
Network stumbler
Honeyd
Some firewall benefits
The session layer
3. Intrusion detection system - it reports attacks against monitored systems/networks
IDS
Best way to protect wireless networks
Worms
Some common UDP ports
4. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Trap door
When setting up a virtual circuit
Some FTP dangers
IDS data normalization
5. The practice of sending an ACK inside another packet going to the same destination
ACK piggybacking
A netmask
What's an easy way to test encryption?
Permutation
6. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
The data link layer
What range is a class A network?
Some NIDS topology limitations
NIDS challenges
7. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
A netcat listener
Browsing attack
Snort
Switches
8. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
NAC
3-way handshake
No State Inspection ACK flag set
The CIA triad
9. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
What threats should be protected against - based on threat levels
Some NIDS topology limitations
Checksum in UDP
The goals of cryptography
10. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
No State Inspection ACK flag set
WAN
MAN
Stateless packet filter
11. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
The protected enclave to defense in depth
When setting up a virtual circuit
Overview of TCP
The CIA triad
12. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Integrity of Data
Some ways to bypass firewall protections
Nmap
War Dialing
13. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
The Uniform Protection to defense in depth
Port scan
Stateful firewall
Multi protocol label switching
14. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
Trojan horse
Defense in depth
DDoS attack
IDS data normalization
15. Handles transmissions across the physical media like wires - fiber - etc
Logic bomb
Network stumbler
The physical layer stack
What range is a class C network?
16. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
NAC
The session layer
File integrity checking work
The five threat vectors
17. Confidentiality - integrity - availability
MAN
The three goals of security
Stateless packet filter
Router
18. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Denial of service
PAN
LAN
Deep packet inspection
19. fast - with little fidelity - examines header information and limited payload data
Shallow packet inspection
Some firewall challenges
What range is a class C network?
Bus Topology
20. Relies on executable code insertion and user interaction to spread
Parasitic malware
Port scan
Address resolution protocol
The OSI model
21. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Macro virus
Arbitrary substitution
To establish a TCP session
Some firewall benefits
22. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Parasitic malware
The network layer
Brute force
Honeypot
23. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
The protected enclave to defense in depth
Alteration of code
SYN flood
The physical layer stack
24. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Switches
Types of viruses
Some disadvantages of honeypots
File Integrity checking work
25. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
Datagram length of a UDP packet
What range is a class A network?
ATM work
Nmap scanning techniques
26. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Stateful firewall
Some Pen Test techniques
Kismet
Some firewall challenges
27. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
WAN
Vulnerabilities
The protected enclave to defense in depth
Social engineering
28. Intellectual property - business goals - validated data - historical
Some NIDS topology limitations
Some malware propagation techniques
What threats should be protected against - based on threat levels
Permutation
29. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Deep packet inspection
IDS data normalization
Alteration of code
Vulnerabilities
30. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
MAN
Plaintext
NIDS advantages
What range is a class A network?
31. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Overview of TCP
DDoS attack
What range is a class B network?
Boot record infector
32. The Practice of sending an ACK inside another packet going to the same destination
Port scan
Overview of TCP
Proxy or application gateway
Ack Piggybacking
33. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
TFTP
No State Inspection ACK flag set
Program infector
File Integrity checking work
34. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
the application layer
Buffer overflow
Some malware capabilities
TFTP
35. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
IDS data normalization
Group
Bus Topology
MAN
36. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
The five threat vectors
Some reasons to use UDP over TCP
Some types of malicious code
The CIA triad
37. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
Some other UDP based protocols
NAC
Some reasons to use UDP over TCP
To establish a TCP session
38. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Router
Rotation?
Vulnerabilities
Group
39. Going around with equipment to detect wireless networks
Wardriving
Firewall
Router
The three goals of security
40. Confidentiality - integrity - availability
The CIA triad
Checksum in UDP
Port scan
Stateless packet filter
41. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
COM/Script program infector
Kismet
Bridge
The OSI model
42. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Arbitrary substitution
NAC
SYN flood
The OSI Protocol Stack
43. Message in its encrypted form
Rotation?
Some NIDS topology limitations
Ciphertext
What categories do vulnerabilities fall into?
44. Provides insight into the tactics - motives - and attacker tools
What's an easy way to test encryption?
Some NIDS topology limitations
Remote maintenance
Some honeypot advantages
45. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Plaintext
IDS not
The transport layer
The four basic approaches to defense in depth
46. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Anomaly analysis work
When setting up a virtual circuit
Some external threat concerns
What ways should the crypto key be protected?
47. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Rotation?
Snort
CIDR
What's a VLAN
48. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Some network design objectives
Internet
File Integrity checking work
Router
49. An attempt to gain access by bombarding it with guesses until the password is found.
NIDS advantages
Snort
Brute force
Some Pen Test techniques
50. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
What threats should be protected against - based on threat levels
Best way to protect wireless networks
Arbitrary substitution
Defense in depth