SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
What range is a class C network?
The TCP/IP model
Some external threat concerns
What categories do vulnerabilities fall into?
2. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Port scan
The Information Centric defense in depth
What categories do vulnerabilities fall into?
The network layer
3. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
A netcat listener
The different cable categories
Social engineering
SYN flood
4. One is for talking - one is for implementing
Some reasons to use TCP over UDP
The difference in stacks
The Information Centric defense in depth
Worms
5. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Risk
Deep packet inspection
Proxy or application gateway
Network stumbler
6. Malware - insider threat - natural disaster - terrorism - pandemic
Best way to protect wireless networks
A network protocol
What primary threats should be protected against
The Uniform Protection to defense in depth
7. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Social engineering
Alteration of code
File Integrity checking work
The threat vector analysis in defense in depth
8. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Some common UDP ports
The Information Centric defense in depth
The transport layer
File Integrity checking work
9. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Some other UDP based protocols
Some external threat concerns
The protected enclave to defense in depth
Integrity of Data
10. destruction of data - leaking confidential information - providing backdoor access
Some malware capabilities
File Integrity checking work
MAN
EXE program infector
11. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Honeypot
Smurf attack
Nmap scanning techniques
Some common TCP ports
12. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
The threat vector analysis in defense in depth
The three goals of security
Some reasons to use UDP over TCP
What primary threats should be protected against
13. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Deep packet inspection
Some common UDP ports
What primary threats should be protected against
MAN
14. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Best way to protect wireless networks
EXE program infector
Kismet
Some NIDS topology limitations
15. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Wardriving
MAN
NIDS challenges
Group
16. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Shallow packet inspection
Total cell size for asynchronous transfer mode (ATM)
File integrity checking work
Logic bomb
17. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some firewall benefits
Router
A network protocol
Total cell size for asynchronous transfer mode (ATM)
18. The practice of sending an ACK inside another packet going to the same destination
Honeypot
ACK piggybacking
Multi protocol label switching
NIDS challenges
19. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Rotation?
The OSI Protocol Stack
The five threat vectors
ATM work
20. Intrusion detection system - it reports attacks against monitored systems/networks
IDS
Internet
A netcat listener
Some reasons to use TCP over UDP
21. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Types of ATM virtual circuits
Snort
When setting up a virtual circuit
The data link layer
22. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
LAN
Trap door
Shallow packet inspection
The data link layer
23. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Asynchronous Transfer Mode
The Uniform Protection to defense in depth
The four basic approaches to defense in depth
What categories do vulnerabilities fall into?
24. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The Information Centric defense in depth
Remote maintenance
IDS signature analysis work
Rootkit
25. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Types of viruses
The session layer
Proxy or application gateway
Some malware propagation techniques
26. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Network stumbler
The difference in stacks
What range is a class A network?
NIDS challenges
27. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Some firewall benefits
Some ways to bypass firewall protections
Switches
War Dialing
28. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
The different cable categories
Denial of service
Permutation
SQL Slammer Worm
29. Confidentiality - integrity - availability
The three goals of security
What threats should be protected against - based on threat levels
Bridge
What range is a class B network?
30. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Total cell size for asynchronous transfer mode (ATM)
Snort
The conficker worm
Best way to protect wireless networks
31. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
WAN
Shallow packet inspection
ATM work
PAN
32. FIN 130 - ACK 131 - FIN 570 - ACK 571
Browsing attack
IDS data normalization
A network protocol
To close a TCP session
33. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Bus Topology
Denial of service
The Uniform Protection to defense in depth
Worms
34. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Remote maintenance
The physical layer stack
Multi protocol label switching
Asynchronous Transfer Mode
35. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
IDS data normalization
What range is a class C network?
Boot record infector
Arbitrary substitution
36. Unencrypted message in its original form
Plaintext
The goals of cryptography
Some external threat concerns
What ways should the crypto key be protected?
37. fast - with little fidelity - examines header information and limited payload data
Permutation
Switches
Shallow packet inspection
EXE program infector
38. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
What threats should be protected against - based on threat levels
Some types of malicious code
Anomaly analysis work
The four basic approaches to defense in depth
39. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Vulnerabilities
TFTP
The difference in stacks
Some honeypot advantages
40. The Practice of sending an ACK inside another packet going to the same destination
Nmap scanning techniques
Ack Piggybacking
Rotation?
Log monitoring work?
41. Going around with equipment to detect wireless networks
The different cable categories
Stateless packet filter
Switches
Wardriving
42. 53 bytes - 48 bytes for data - 5 bytes for the header
Router
Port scan
Total cell size for asynchronous transfer mode (ATM)
SQL Slammer Worm
43. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The transport layer
Address resolution protocol
The different cable categories
Anomaly analysis work
44. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Some ways to bypass firewall protections
Datagram length of a UDP packet
Some common TCP ports
Bridge
45. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
The protected enclave to defense in depth
NIDS challenges
What threats should be protected against - based on threat levels
Some Pen Test techniques
46. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Some common TCP ports
SYN flood
A blind FTP
Social engineering
47. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Alteration of code
Permutation
CIDR
Wardriving
48. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
What's an easy way to test encryption?
Some ways to bypass firewall protections
Types of viruses
A netmask
49. Confidentiality - integrity - availability
The CIA triad
What's a VLAN
Vulnerabilities
Shallow packet inspection
50. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
File Integrity checking work
The network layer
What categories do vulnerabilities fall into?
Some honeypot advantages
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests