SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
Arbitrary substitution
Snort
The different cable categories
When setting up a virtual circuit
2. Uniform protection - protected enclaves - information centric - threat vector analysis
File Integrity checking work
Honeypot
Rootkit
The four basic approaches to defense in depth
3. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
Some external threat concerns
Remote maintenance
Some NIDS topology limitations
4. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
When talking about protocols and referencing layers - what stack is used
Rotation?
WAN
File Integrity checking work
5. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
What's an easy way to test encryption?
The different cable categories
Bridge
Some reasons to use UDP over TCP
6. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
NAC
When implementing protocols - what stack should be used?
The Uniform Protection to defense in depth
ATM work
7. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Asynchronous Transfer Mode
Anomaly analysis work
Some ways to bypass firewall protections
Some reasons to use TCP over UDP
8. It interacts with the application layer to determine which network services will be required
Bus Topology
Permutation
the application layer
Macro virus
9. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
The TCP/IP model
PAN
Some common TCP ports
Some malware propagation techniques
10. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
The presentation layer
Browsing attack
File Integrity checking work
No State Inspection ACK flag set
11. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Firewall
Plaintext
Proxy or application gateway
Deep packet inspection
12. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Some NIDS topology limitations
Some Pen Test techniques
Bridge
The CIA triad
13. Confidentiality - integrity - availability
What primary threats should be protected against
The three goals of security
NIDS challenges
What range is a class A network?
14. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Hubs
What primary threats should be protected against
Macro virus
Switches
15. Attaches itself to existing program files and activated when the exe is launched
When setting up a virtual circuit
Some other UDP based protocols
Denial of service
Program infector
16. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Plaintext
Some other UDP based protocols
NIDS challenges
Log monitoring work?
17. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
Address resolution protocol
The three goals of security
A blind FTP
Best way to protect wireless networks
18. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
A netmask
Bridge
CIDR
19. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
The presentation layer
Some disadvantages of honeypots
The threat vector analysis in defense in depth
Program infector
20. Network scanner.
EXE program infector
Some NIDS topology limitations
Brute force
Nmap
21. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
The physical layer stack
LAN
WAN
Nmap
22. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
A netmask
Port scan
Wardriving
Best way to protect wireless networks
23. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Some Pen Test techniques
Denial of service
MAN
Deep packet inspection
24. Infects MBR - no network spreading potential
A blind FTP
Boot record infector
Datagram length of a UDP packet
File Integrity checking work
25. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
The OSI model
Internet
Hubs
A netcat listener
26. OSI
When talking about protocols and referencing layers - what stack is used
Some Pen Test techniques
Some ways to bypass firewall protections
Some common TCP ports
27. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Some malware propagation techniques
The four types of events reported by IDS
The presentation layer
Vulnerabilities
28. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
A network protocol
Asynchronous Transfer Mode
Some external threat concerns
Parasitic malware
29. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Group
Defense in depth
SQL Slammer Worm
Anomaly analysis work
30. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
The conficker worm
IDS data normalization
Trojan horse
Switches
31. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
LAN
Overview of TCP
HIDS monitor
PAN
32. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Some disadvantages of honeypots
Ack Piggybacking
Address Resolution Protocol (ARP)
Overview of TCP
33. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
DDoS attack
To close a TCP session
WAN
IDS signature analysis work
34. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Parasitic malware
The different cable categories
The data link layer
Program infector
35. Simple attack done by simply browsing available information that's allowed on a local network.
The Information Centric defense in depth
Buffer overflow
Browsing attack
The threat vector analysis in defense in depth
36. One is for talking - one is for implementing
The difference in stacks
LAN
Some network design objectives
What range is a class A network?
37. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Some firewall challenges
Best way to protect wireless networks
Smurf attack
The network layer
38. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
Worms
SQL Slammer Worm
Some FTP dangers
A blind FTP
39. A cracking tool inserted into the OS that allows the attacker to do as they please.
Logic bomb
Switches
Rootkit
Port scan
40. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
What range is a class A network?
Smurf attack
Some disadvantages of honeypots
Some firewall challenges
41. The practice of sending an ACK inside another packet going to the same destination
ACK piggybacking
EXE program infector
Internet
Hubs
42. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The Information Centric defense in depth
UDP packet headers
The transport layer
The four types of events reported by IDS
43. The Practice of sending an ACK inside another packet going to the same destination
Ack Piggybacking
Snort
UDP packet headers
HIDS monitor
44. Known - unknown - zero day
What categories do vulnerabilities fall into?
What's an easy way to test encryption?
Hping
What ways should the crypto key be protected?
45. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Trojan horse
Overview of TCP
UDP packet headers
Stateless packet filter
46. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
Some types of malicious code
What range is a class A network?
Group
What range is a class C network?
47. Considered to be a perimeter device
Shallow packet inspection
The five threat vectors
IDS
Router
48. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
The physical layer stack
Port scan
Kismet
The difference in stacks
49. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
NIDS challenges
The Information Centric defense in depth
Some Pen Test techniques
Some firewall benefits
50. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183