SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. logic bomb - trojan horse - trap door
Some types of malicious code
Some other UDP based protocols
Wardriving
Arbitrary substitution
2. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Some malware propagation techniques
No State Inspection ACK flag set
Logic bomb
Trojan horse
3. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Shallow packet inspection
To establish a TCP session
TFTP
IDS not
4. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Permutation
Some types of malicious code
Stateful firewall
A network protocol
5. Confidentiality - symmetric encryption
IDS signature analysis work
Log monitoring work?
The transport layer
The goals of cryptography
6. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
The presentation layer
Hubs
Some external threat concerns
Hping
7. Handles transmissions across the physical media like wires - fiber - etc
Proxy or application gateway
Program infector
The five threat vectors
The physical layer stack
8. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Trap door
Some firewall challenges
Firewall
Permutation
9. Network scanner.
TFTP
To close a TCP session
Nmap
MAN
10. One is for talking - one is for implementing
The session layer
Group
The difference in stacks
ACK piggybacking
11. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
IDS not
Some firewall challenges
The difference in stacks
Some firewall benefits
12. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Vulnerabilities
Honeyd
IDS
EXE program infector
13. A cracking tool inserted into the OS that allows the attacker to do as they please.
A network protocol
When implementing protocols - what stack should be used?
The conficker worm
Rootkit
14. 53 bytes - 48 bytes for data - 5 bytes for the header
DDoS attack
Total cell size for asynchronous transfer mode (ATM)
Shallow packet inspection
ATM work
15. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
EXE program infector
Some types of malicious code
Kismet
Some common UDP ports
16. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Rotation?
NIDS challenges
Network stumbler
No State Inspection ACK flag set
17. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Checksum in UDP
HIDS monitor
Smurf attack
What range is a class A network?
18. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Multi protocol label switching
The OSI Protocol Stack
Kismet
What range is a class B network?
19. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Simple attack done by simply browsing available information that's allowed on a local network.
Browsing attack
The four types of events reported by IDS
When implementing protocols - what stack should be used?
Defense in depth
21. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Some NIDS topology limitations
Some ways to bypass firewall protections
The data link layer
What range is a class B network?
22. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
When implementing protocols - what stack should be used?
Hping
Stateful firewall
Some malware capabilities
23. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
3-way handshake
What categories do vulnerabilities fall into?
Some reasons to use TCP over UDP
The CIA triad
24. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
No State Inspection ACK flag set
Ciphertext
OS Command Injection defenses
Rootkit
25. FIN 130 - ACK 131 - FIN 570 - ACK 571
When talking about protocols and referencing layers - what stack is used
Social engineering
3-way handshake
To close a TCP session
26. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
EXE program infector
File Integrity checking work
Group
Address resolution protocol
27. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
Router
The five threat vectors
Some disadvantages of honeypots
Rotation?
28. An attempt to gain access by bombarding it with guesses until the password is found.
The protected enclave to defense in depth
The five threat vectors
Brute force
File integrity checking work
29. Uniform protection - protected enclaves - information centric - threat vector analysis
To close a TCP session
To establish a TCP session
War Dialing
The four basic approaches to defense in depth
30. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
The four types of events reported by IDS
Honeypot
Snort
IDS signature analysis work
31. It interacts with the application layer to determine which network services will be required
the application layer
Remote maintenance
The OSI Protocol Stack
Some malware propagation techniques
32. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
Deep packet inspection
The goals of cryptography
Defense in depth
ATM work
33. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Log monitoring work?
EXE program infector
The network layer
Some FTP dangers
34. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Types of viruses
Ack Piggybacking
Bridge
SYN flood
35. Bits of code embedded in programs to quickly gain access at a later time
To establish a TCP session
Ack Piggybacking
What ways should the crypto key be protected?
Trap door
36. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS data normalization
Integrity of Data
Logic bomb
Some firewall challenges
37. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
When talking about protocols and referencing layers - what stack is used
Address Resolution Protocol (ARP)
Some NIDS topology limitations
The protected enclave to defense in depth
38. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Alteration of code
Rotation?
To establish a TCP session
Program infector
39. Going around with equipment to detect wireless networks
Honeypot
Wardriving
Some common TCP ports
Denial of service
40. Considered to be a perimeter device
Types of viruses
Ciphertext
Router
Social engineering
41. Infects MBR - no network spreading potential
PAN
Some malware capabilities
Boot record infector
Proxy or application gateway
42. True positive - false positive - true negative - false negative
The four types of events reported by IDS
What range is a class A network?
Hping
Program infector
43. Intrusion detection system - it reports attacks against monitored systems/networks
Trojan horse
Rootkit
IDS
To close a TCP session
44. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
The CIA triad
HIDS monitor
Ciphertext
No State Inspection ACK flag set
45. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Honeyd
CIDR
Some common TCP ports
Some FTP dangers
46. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Some Pen Test techniques
Anomaly analysis work
Total cell size for asynchronous transfer mode (ATM)
When setting up a virtual circuit
47. Relies on executable code insertion and user interaction to spread
Stateful firewall
Program infector
File Integrity checking work
Parasitic malware
48. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
NIDS advantages
The presentation layer
EXE program infector
Deep packet inspection
49. fast - with little fidelity - examines header information and limited payload data
The CIA triad
What's an easy way to test encryption?
The protected enclave to defense in depth
Shallow packet inspection
50. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
ACK piggybacking
What range is a class A network?
Some common TCP ports
The presentation layer