SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some firewall challenges
NIDS advantages
Hping
3-way handshake
2. Infects MBR - no network spreading potential
The Information Centric defense in depth
File Integrity checking work
When talking about protocols and referencing layers - what stack is used
Boot record infector
3. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
The OSI Protocol Stack
Risk
Some FTP dangers
Wardriving
4. Going around with equipment to detect wireless networks
Arbitrary substitution
Wardriving
The transport layer
Some firewall challenges
5. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
COM/Script program infector
Plaintext
A network protocol
The four basic approaches to defense in depth
6. Relies on executable code insertion and user interaction to spread
Parasitic malware
DDoS attack
What ways should the crypto key be protected?
A network protocol
7. Bits of code embedded in programs to quickly gain access at a later time
The protected enclave to defense in depth
TFTP
Trap door
The five threat vectors
8. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
The difference in stacks
Checksum in UDP
EXE program infector
Denial of service
9. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Some common TCP ports
NIDS advantages
UDP packet headers
Some other UDP based protocols
10. Considered to be a perimeter device
Some firewall benefits
Router
Race conditions
PAN
11. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Brute force
The three goals of security
Group
3-way handshake
12. It makes sure the data sent from one side to the other is in a format useful to the other side
COM/Script program infector
Hubs
Buffer overflow
The presentation layer
13. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
MAN
Macro virus
Trojan horse
UDP packet headers
14. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Group
Asynchronous Transfer Mode
Buffer overflow
Overview of TCP
15. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
SYN flood
Log monitoring work?
Bus Topology
Some network design objectives
16. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
LAN
A netmask
Some honeypot advantages
IDS signature analysis work
17. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
What range is a class A network?
Nmap
Total cell size for asynchronous transfer mode (ATM)
Some types of malicious code
18. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Race conditions
Vulnerabilities
No State Inspection ACK flag set
Snort
19. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
COM/Script program infector
TFTP
Defense in depth
Log monitoring work?
20. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Social engineering
Asynchronous Transfer Mode
TFTP
IDS not
21. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Race conditions
A network protocol
When implementing protocols - what stack should be used?
Some FTP dangers
22. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
A netmask
Honeypot
IDS signature analysis work
A netcat listener
23. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Ack Piggybacking
Proxy or application gateway
The transport layer
Brute force
24. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Some ways to bypass firewall protections
Some reasons to use UDP over TCP
Stateful firewall
SQL Slammer Worm
25. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
The different cable categories
Network stumbler
Checksum in UDP
Address Resolution Protocol (ARP)
26. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Best way to protect wireless networks
Some reasons to use TCP over UDP
Kismet
Some malware capabilities
27. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
When implementing protocols - what stack should be used?
Some reasons to use UDP over TCP
No State Inspection ACK flag set
Some external threat concerns
28. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
3-way handshake
Bus Topology
Deep packet inspection
Asynchronous Transfer Mode
29. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
When talking about protocols and referencing layers - what stack is used
OS Command Injection defenses
Plaintext
What primary threats should be protected against
30. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
Remote maintenance
Overview of TCP
SQL Slammer Worm
What's an easy way to test encryption?
31. Network scanner.
Router
Types of viruses
The different cable categories
Nmap
32. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
UDP packet headers
Parasitic malware
Stateless packet filter
Honeypot
33. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Worms
Some disadvantages of honeypots
Anomaly analysis work
Firewall
34. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The five threat vectors
Ack Piggybacking
Types of viruses
Remote maintenance
35. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
The network layer
Some firewall benefits
Address resolution protocol
Program infector
36. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
The transport layer
Datagram length of a UDP packet
The Information Centric defense in depth
File Integrity checking work
37. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
War Dialing
Network stumbler
The CIA triad
HIDS monitor
38. FIN 130 - ACK 131 - FIN 570 - ACK 571
Address Resolution Protocol (ARP)
SQL Slammer Worm
Alteration of code
To close a TCP session
39. Handles transmissions across the physical media like wires - fiber - etc
Permutation
Denial of service
What primary threats should be protected against
The physical layer stack
40. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Logic bomb
The threat vector analysis in defense in depth
Buffer overflow
NAC
41. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Some Pen Test techniques
The session layer
Vulnerabilities
Checksum in UDP
42. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
The threat vector analysis in defense in depth
The physical layer stack
Bus Topology
Some NIDS topology limitations
43. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Denial of service
The data link layer
Race conditions
The threat vector analysis in defense in depth
44. Known - unknown - zero day
Some disadvantages of honeypots
Nmap scanning techniques
Proxy or application gateway
What categories do vulnerabilities fall into?
45. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Integrity of Data
Types of viruses
Hubs
The Information Centric defense in depth
46. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
Address Resolution Protocol (ARP)
Some types of malicious code
EXE program infector
ATM work
47. Confidentiality - integrity - availability
Some reasons to use UDP over TCP
What ways should the crypto key be protected?
When talking about protocols and referencing layers - what stack is used
The CIA triad
48. Intrusion detection system - it reports attacks against monitored systems/networks
Some reasons to use UDP over TCP
To establish a TCP session
IDS
Integrity of Data
49. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Datagram length of a UDP packet
The OSI model
The difference in stacks
The session layer
50. One is for talking - one is for implementing
The Uniform Protection to defense in depth
The difference in stacks
Some NIDS topology limitations
MAN
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests