SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Log monitoring work?
Port scan
Hping
Datagram length of a UDP packet
2. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Alteration of code
NIDS advantages
The five threat vectors
The different cable categories
3. It interacts with the application layer to determine which network services will be required
Trap door
Types of ATM virtual circuits
Honeypot
the application layer
4. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Checksum in UDP
DDoS attack
Anomaly analysis work
The threat vector analysis in defense in depth
5. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Remote maintenance
MAN
OS Command Injection defenses
SQL Slammer Worm
6. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
IDS not
Rotation?
Defense in depth
Bridge
7. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
NIDS challenges
The Uniform Protection to defense in depth
IDS
COM/Script program infector
8. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Buffer overflow
Boot record infector
Hping
What categories do vulnerabilities fall into?
9. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Kismet
What threats should be protected against - based on threat levels
Hubs
Some other UDP based protocols
10. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
What's an easy way to test encryption?
Worms
Defense in depth
What ways should the crypto key be protected?
11. Attaches itself to existing program files and activated when the exe is launched
Program infector
Ack Piggybacking
A network protocol
Some types of malicious code
12. Unencrypted message in its original form
Switches
Plaintext
The threat vector analysis in defense in depth
Vulnerabilities
13. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
The three goals of security
Trojan horse
A netmask
The different cable categories
14. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
MAN
Firewall
Trap door
Logic bomb
15. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Some disadvantages of honeypots
Program infector
Risk
DDoS attack
16. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Buffer overflow
Some NIDS topology limitations
ATM work
SYN flood
17. Unified data carrying service - replacing from replay and ATM
Macro virus
Some malware propagation techniques
HIDS monitor
Multi protocol label switching
18. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
What primary threats should be protected against
Switches
HIDS monitor
Some types of malicious code
19. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
The conficker worm
A netcat listener
Risk
Network stumbler
20. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
HIDS monitor
Some reasons to use TCP over UDP
NAC
21. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
A network protocol
To establish a TCP session
COM/Script program infector
Risk
22. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Some NIDS topology limitations
Some network design objectives
The data link layer
The different cable categories
23. destruction of data - leaking confidential information - providing backdoor access
The session layer
Some malware capabilities
Some firewall challenges
When implementing protocols - what stack should be used?
24. One is for talking - one is for implementing
The difference in stacks
A netcat listener
Defense in depth
Kismet
25. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
IDS not
A netcat listener
IDS signature analysis work
Internet
26. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Checksum in UDP
UDP packet headers
Best way to protect wireless networks
ATM work
27. The practice of sending an ACK inside another packet going to the same destination
To establish a TCP session
ACK piggybacking
What primary threats should be protected against
The four basic approaches to defense in depth
28. Intellectual property - business goals - validated data - historical
Logic bomb
The Uniform Protection to defense in depth
What threats should be protected against - based on threat levels
The Information Centric defense in depth
29. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Trap door
Log monitoring work?
No State Inspection ACK flag set
Remote maintenance
30. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Switches
MAN
The OSI model
Denial of service
31. Bits of code embedded in programs to quickly gain access at a later time
Trap door
Hping
Honeypot
Network stumbler
32. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Datagram length of a UDP packet
Program infector
Rotation?
SQL Slammer Worm
33. Network scanner.
Some ways to bypass firewall protections
Nmap
Worms
Shallow packet inspection
34. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
MAN
NIDS advantages
Some external threat concerns
What ways should the crypto key be protected?
35. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Some Pen Test techniques
The Information Centric defense in depth
File Integrity checking work
Bridge
36. Known - unknown - zero day
Trojan horse
What categories do vulnerabilities fall into?
Some firewall challenges
NIDS advantages
37. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
The different cable categories
Some honeypot advantages
Some Pen Test techniques
The conficker worm
38. Intrusion detection system - it reports attacks against monitored systems/networks
Permutation
Checksum in UDP
IDS
When talking about protocols and referencing layers - what stack is used
39. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Some external threat concerns
What range is a class B network?
Datagram length of a UDP packet
What's an easy way to test encryption?
40. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Router
The physical layer stack
Bus Topology
Some ways to bypass firewall protections
41. logic bomb - trojan horse - trap door
Total cell size for asynchronous transfer mode (ATM)
Some malware propagation techniques
Some types of malicious code
Group
42. Considered to be a perimeter device
OS Command Injection defenses
Nmap
To establish a TCP session
Router
43. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
To establish a TCP session
Switches
The TCP/IP model
Vulnerabilities
44. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Browsing attack
Race conditions
Some reasons to use UDP over TCP
DDoS attack
45. Confidentiality - integrity - availability
A netcat listener
The CIA triad
File integrity checking work
Hubs
46. Simple attack done by simply browsing available information that's allowed on a local network.
Bridge
Social engineering
Browsing attack
IDS signature analysis work
47. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
Alteration of code
The TCP/IP model
The OSI Protocol Stack
Plaintext
48. Handles transmissions across the physical media like wires - fiber - etc
What threats should be protected against - based on threat levels
The physical layer stack
Vulnerabilities
What primary threats should be protected against
49. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Remote maintenance
The transport layer
Program infector
Snort
50. 53 bytes - 48 bytes for data - 5 bytes for the header
What range is a class B network?
No State Inspection ACK flag set
Total cell size for asynchronous transfer mode (ATM)
Integrity of Data