SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS data normalization
Smurf attack
Port scan
To establish a TCP session
2. Connects many WANs - MANs - and LANs - provided via ISP
Internet
Race conditions
The three goals of security
Vulnerabilities
3. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Group
Stateless packet filter
What categories do vulnerabilities fall into?
Deep packet inspection
4. Unencrypted message in its original form
Shallow packet inspection
Firewall
Plaintext
COM/Script program infector
5. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
What range is a class C network?
ATM work
Smurf attack
Proxy or application gateway
6. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
The three goals of security
A netmask
Hubs
MAN
7. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
The Uniform Protection to defense in depth
The TCP/IP model
The network layer
Datagram length of a UDP packet
8. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
The difference in stacks
Asynchronous Transfer Mode
Network stumbler
UDP packet headers
9. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Some types of malicious code
Snort
3-way handshake
What range is a class B network?
10. Confidentiality - integrity - availability
The three goals of security
What range is a class B network?
The five threat vectors
Port scan
11. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
Nmap scanning techniques
Logic bomb
The data link layer
The five threat vectors
12. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
File Integrity checking work
NIDS challenges
The Information Centric defense in depth
What's an easy way to test encryption?
13. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
The transport layer
Nmap
Kismet
Some reasons to use UDP over TCP
14. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Types of viruses
What range is a class A network?
What range is a class B network?
Hping
15. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
When implementing protocols - what stack should be used?
What ways should the crypto key be protected?
What range is a class A network?
16. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Log monitoring work?
What primary threats should be protected against
Some FTP dangers
Some Pen Test techniques
17. OSI
The threat vector analysis in defense in depth
To close a TCP session
Browsing attack
When talking about protocols and referencing layers - what stack is used
18. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Race conditions
Wardriving
Remote maintenance
The four basic approaches to defense in depth
19. Simple attack done by simply browsing available information that's allowed on a local network.
Browsing attack
Buffer overflow
Best way to protect wireless networks
Rootkit
20. It makes sure the data sent from one side to the other is in a format useful to the other side
Some network design objectives
The presentation layer
Some malware capabilities
ACK piggybacking
21. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
What ways should the crypto key be protected?
IDS data normalization
Integrity of Data
Logic bomb
22. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Deep packet inspection
EXE program infector
IDS
Trap door
23. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
What range is a class C network?
Macro virus
Race conditions
Port scan
24. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
Some FTP dangers
Datagram length of a UDP packet
HIDS monitor
LAN
25. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
The conficker worm
LAN
Integrity of Data
SYN flood
26. An attempt to gain access by bombarding it with guesses until the password is found.
What primary threats should be protected against
IDS signature analysis work
Types of viruses
Brute force
27. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Arbitrary substitution
Some FTP dangers
MAN
The data link layer
28. The Practice of sending an ACK inside another packet going to the same destination
Ack Piggybacking
When talking about protocols and referencing layers - what stack is used
Shallow packet inspection
No State Inspection ACK flag set
29. Infects MBR - no network spreading potential
Parasitic malware
Bridge
Overview of TCP
Boot record infector
30. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
The physical layer stack
Snort
The different cable categories
Kismet
31. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Browsing attack
Some Pen Test techniques
Overview of TCP
What range is a class C network?
32. It handles the establishment and maintenance of connections between systems
The session layer
Parasitic malware
TFTP
The Uniform Protection to defense in depth
33. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
What primary threats should be protected against
Risk
Trap door
Checksum in UDP
34. Attaches itself to existing program files and activated when the exe is launched
Program infector
NAC
the application layer
IDS not
35. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Anomaly analysis work
Bridge
No State Inspection ACK flag set
Ack Piggybacking
36. Confidentiality - symmetric encryption
The CIA triad
IDS signature analysis work
The goals of cryptography
Ciphertext
37. Uniform protection - protected enclaves - information centric - threat vector analysis
Denial of service
The four basic approaches to defense in depth
Some types of malicious code
A netmask
38. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
Integrity of Data
The TCP/IP model
A netmask
The conficker worm
39. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
CIDR
A netcat listener
Some disadvantages of honeypots
Brute force
40. FIN 130 - ACK 131 - FIN 570 - ACK 571
To close a TCP session
The Uniform Protection to defense in depth
Honeyd
What threats should be protected against - based on threat levels
41. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Hubs
Worms
Trap door
The three goals of security
42. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
The different cable categories
Network stumbler
Some ways to bypass firewall protections
OS Command Injection defenses
43. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Stateful firewall
To establish a TCP session
Remote maintenance
Permutation
44. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
Some types of malicious code
ATM work
Overview of TCP
45. Considered to be a perimeter device
Router
IDS not
Browsing attack
What categories do vulnerabilities fall into?
46. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
The Uniform Protection to defense in depth
Stateful firewall
Trojan horse
The TCP/IP model
47. Going around with equipment to detect wireless networks
Wardriving
The CIA triad
War Dialing
Trojan horse
48. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Stateless packet filter
File Integrity checking work
Port scan
The presentation layer
49. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bridge
Stateless packet filter
The goals of cryptography
UDP packet headers
50. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
Ack Piggybacking
A netcat listener
File Integrity checking work
SQL Slammer Worm