SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Browsing attack
Denial of service
Some FTP dangers
Stateful firewall
2. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Ack Piggybacking
Honeypot
No State Inspection ACK flag set
What categories do vulnerabilities fall into?
3. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Some malware capabilities
The transport layer
The data link layer
NIDS advantages
4. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Nmap
The three goals of security
Some external threat concerns
Router
5. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
The Information Centric defense in depth
The four basic approaches to defense in depth
Permutation
Buffer overflow
6. Handles transmissions across the physical media like wires - fiber - etc
Defense in depth
Bus Topology
The physical layer stack
Hping
7. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
The goals of cryptography
What range is a class B network?
The data link layer
8. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Deep packet inspection
Denial of service
Checksum in UDP
The four types of events reported by IDS
9. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
3-way handshake
The five threat vectors
When setting up a virtual circuit
What's an easy way to test encryption?
10. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Shallow packet inspection
HIDS monitor
A network protocol
Hping
11. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
LAN
Some disadvantages of honeypots
The network layer
Trap door
12. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
The goals of cryptography
EXE program infector
Integrity of Data
The conficker worm
13. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
No State Inspection ACK flag set
Firewall
Alteration of code
Smurf attack
14. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
What primary threats should be protected against
Buffer overflow
Nmap scanning techniques
Honeyd
15. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
Ciphertext
LAN
Rootkit
WAN
16. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
The difference in stacks
Arbitrary substitution
Macro virus
To close a TCP session
17. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Some ways to bypass firewall protections
the application layer
Vulnerabilities
NIDS advantages
18. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
Multi protocol label switching
Buffer overflow
Hping
IDS data normalization
19. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Defense in depth
The four types of events reported by IDS
Some other UDP based protocols
Nmap
20. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Best way to protect wireless networks
Some other UDP based protocols
OS Command Injection defenses
Some malware propagation techniques
21. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
the application layer
Some malware propagation techniques
NIDS challenges
HIDS monitor
22. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Switches
Firewall
Snort
Overview of TCP
23. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
The protected enclave to defense in depth
Some types of malicious code
The goals of cryptography
Total cell size for asynchronous transfer mode (ATM)
24. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Some reasons to use TCP over UDP
LAN
Rootkit
3-way handshake
25. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
WAN
Some malware propagation techniques
To establish a TCP session
ATM work
26. Syn - Syn/Ack - Ack
Some Pen Test techniques
Remote maintenance
Parasitic malware
To establish a TCP session
27. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
LAN
File integrity checking work
A blind FTP
Ack Piggybacking
28. Confidentiality - integrity - availability
Ciphertext
The CIA triad
Integrity of Data
Some NIDS topology limitations
29. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Types of ATM virtual circuits
SYN flood
Race conditions
The Information Centric defense in depth
30. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
IDS signature analysis work
The protected enclave to defense in depth
Firewall
Kismet
31. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Trap door
Remote maintenance
Network stumbler
What range is a class C network?
32. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Remote maintenance
Address Resolution Protocol (ARP)
IDS signature analysis work
The Uniform Protection to defense in depth
33. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
A netmask
Some malware propagation techniques
The OSI Protocol Stack
Group
34. Attaches itself to existing program files and activated when the exe is launched
Program infector
Some external threat concerns
Wardriving
Types of ATM virtual circuits
35. Uniform protection - protected enclaves - information centric - threat vector analysis
The four basic approaches to defense in depth
The physical layer stack
The CIA triad
What's a VLAN
36. OSI
Program infector
Some common UDP ports
When talking about protocols and referencing layers - what stack is used
What's a VLAN
37. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
MAN
A netmask
The difference in stacks
Trojan horse
38. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
What's a VLAN
Total cell size for asynchronous transfer mode (ATM)
Some Pen Test techniques
Remote maintenance
39. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
The threat vector analysis in defense in depth
A netmask
File Integrity checking work
Some malware propagation techniques
40. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
To close a TCP session
What range is a class B network?
Honeyd
The protected enclave to defense in depth
41. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
The session layer
Hubs
Some external threat concerns
Multi protocol label switching
42. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
CIDR
File integrity checking work
HIDS monitor
WAN
43. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Nmap scanning techniques
The goals of cryptography
When setting up a virtual circuit
The threat vector analysis in defense in depth
44. fast - with little fidelity - examines header information and limited payload data
The CIA triad
Trojan horse
COM/Script program infector
Shallow packet inspection
45. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Some network design objectives
Port scan
What primary threats should be protected against
A blind FTP
46. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
EXE program infector
the application layer
HIDS monitor
Some other UDP based protocols
47. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Datagram length of a UDP packet
The OSI model
Overview of TCP
The four types of events reported by IDS
49. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
NIDS advantages
Ciphertext
Proxy or application gateway
The four types of events reported by IDS
50. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
When setting up a virtual circuit
Hping
Trap door
Asynchronous Transfer Mode
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests