SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
War Dialing
Types of ATM virtual circuits
Plaintext
Stateless packet filter
2. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Rootkit
The Information Centric defense in depth
UDP packet headers
Risk
3. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
The presentation layer
Some FTP dangers
Switches
4. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
The goals of cryptography
The OSI model
The three goals of security
Trojan horse
5. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
Some firewall benefits
Program infector
The CIA triad
6. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Switches
When implementing protocols - what stack should be used?
What range is a class A network?
Some malware capabilities
7. Personal area network - phone tethering - bluetooth - etc
What range is a class C network?
Hubs
Honeyd
PAN
8. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
PAN
Best way to protect wireless networks
Internet
SYN flood
9. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
Log monitoring work?
Hping
Datagram length of a UDP packet
A netcat listener
10. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
Some reasons to use UDP over TCP
The different cable categories
The session layer
The Information Centric defense in depth
11. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Defense in depth
Address resolution protocol
Logic bomb
Rotation?
12. An attempt to gain access by bombarding it with guesses until the password is found.
Some firewall challenges
Ciphertext
Bus Topology
Brute force
13. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
The different cable categories
Types of viruses
NAC
EXE program infector
14. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some external threat concerns
Smurf attack
Some firewall challenges
Arbitrary substitution
15. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Brute force
Some other UDP based protocols
Some Pen Test techniques
Nmap
16. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Switches
Hubs
Some reasons to use UDP over TCP
Some other UDP based protocols
17. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
What range is a class C network?
Types of ATM virtual circuits
The protected enclave to defense in depth
The three goals of security
18. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
The conficker worm
Buffer overflow
War Dialing
Trap door
19. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Address Resolution Protocol (ARP)
NIDS advantages
Deep packet inspection
Parasitic malware
20. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
SYN flood
A netcat listener
3-way handshake
Bus Topology
21. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
What range is a class C network?
Some network design objectives
Hubs
Types of viruses
22. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Parasitic malware
Permutation
Some Pen Test techniques
What primary threats should be protected against
23. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Nmap scanning techniques
Some firewall challenges
When implementing protocols - what stack should be used?
Datagram length of a UDP packet
24. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
3-way handshake
Some malware capabilities
War Dialing
Group
25. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Stateless packet filter
Rotation?
LAN
Switches
26. Unencrypted message in its original form
Plaintext
Defense in depth
The physical layer stack
Switches
27. Relies on executable code insertion and user interaction to spread
What ways should the crypto key be protected?
The goals of cryptography
Some reasons to use UDP over TCP
Parasitic malware
28. logic bomb - trojan horse - trap door
To establish a TCP session
The presentation layer
Some types of malicious code
Boot record infector
29. Confidentiality - integrity - availability
UDP packet headers
The CIA triad
Nmap scanning techniques
The physical layer stack
30. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
Types of ATM virtual circuits
Buffer overflow
IDS signature analysis work
Datagram length of a UDP packet
31. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Denial of service
Log monitoring work?
Some common UDP ports
COM/Script program infector
32. Message in its encrypted form
Internet
What's a VLAN
Trojan horse
Ciphertext
33. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
Logic bomb
EXE program infector
Some external threat concerns
IDS data normalization
34. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Some FTP dangers
To close a TCP session
3-way handshake
When talking about protocols and referencing layers - what stack is used
35. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Some reasons to use UDP over TCP
Some ways to bypass firewall protections
Rotation?
War Dialing
36. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Some reasons to use UDP over TCP
The network layer
Logic bomb
OS Command Injection defenses
37. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
IDS signature analysis work
Some external threat concerns
The OSI model
Switches
38. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Anomaly analysis work
SYN flood
Some malware propagation techniques
To close a TCP session
39. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
IDS
Some FTP dangers
Asynchronous Transfer Mode
Bus Topology
40. Confidentiality - symmetric encryption
Race conditions
Some external threat concerns
Worms
The goals of cryptography
41. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
COM/Script program infector
File Integrity checking work
Permutation
ATM work
42. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
The five threat vectors
Some firewall challenges
What primary threats should be protected against
44. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
File integrity checking work
Internet
The OSI Protocol Stack
Bridge
45. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Best way to protect wireless networks
A netcat listener
The transport layer
The difference in stacks
46. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
TFTP
The OSI Protocol Stack
Permutation
WAN
47. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
OS Command Injection defenses
Multi protocol label switching
Some reasons to use UDP over TCP
The data link layer
48. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some firewall benefits
The physical layer stack
What's a VLAN
The CIA triad
50. The practice of sending an ACK inside another packet going to the same destination
COM/Script program infector
ACK piggybacking
The transport layer
SQL Slammer Worm