SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
What range is a class A network?
File integrity checking work
The different cable categories
Some common TCP ports
2. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
When talking about protocols and referencing layers - what stack is used
The data link layer
The TCP/IP model
The transport layer
3. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
When implementing protocols - what stack should be used?
WAN
Some reasons to use TCP over UDP
Smurf attack
5. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Asynchronous Transfer Mode
Total cell size for asynchronous transfer mode (ATM)
What's a VLAN
Some NIDS topology limitations
6. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Some honeypot advantages
The data link layer
MAN
Bus Topology
7. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Internet
OS Command Injection defenses
Proxy or application gateway
What threats should be protected against - based on threat levels
8. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
File Integrity checking work
Some NIDS topology limitations
Datagram length of a UDP packet
LAN
9. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
What range is a class A network?
A blind FTP
Switches
Nmap
10. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
IDS signature analysis work
The Uniform Protection to defense in depth
Honeyd
Checksum in UDP
11. It interacts with the application layer to determine which network services will be required
Shallow packet inspection
Nmap
Bus Topology
the application layer
12. It makes sure the data sent from one side to the other is in a format useful to the other side
HIDS monitor
What range is a class C network?
Worms
The presentation layer
13. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
UDP packet headers
Worms
Buffer overflow
Honeyd
14. Confidentiality - integrity - availability
Some common TCP ports
Switches
The conficker worm
The three goals of security
15. Infects MBR - no network spreading potential
What range is a class C network?
The five threat vectors
Boot record infector
Smurf attack
16. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
COM/Script program infector
Ciphertext
CIDR
Some disadvantages of honeypots
17. Bits of code embedded in programs to quickly gain access at a later time
The Uniform Protection to defense in depth
The CIA triad
Some disadvantages of honeypots
Trap door
18. OSI
The difference in stacks
Snort
Remote maintenance
When talking about protocols and referencing layers - what stack is used
19. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Switches
Datagram length of a UDP packet
Permutation
Some common UDP ports
20. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Types of viruses
Some other UDP based protocols
Proxy or application gateway
Browsing attack
21. Personal area network - phone tethering - bluetooth - etc
Anomaly analysis work
Internet
IDS
PAN
22. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
DDoS attack
Permutation
Total cell size for asynchronous transfer mode (ATM)
Types of ATM virtual circuits
23. True positive - false positive - true negative - false negative
War Dialing
Some malware capabilities
Social engineering
The four types of events reported by IDS
24. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
NIDS challenges
Brute force
CIDR
SYN flood
25. An attempt to gain access by bombarding it with guesses until the password is found.
Social engineering
Brute force
Some NIDS topology limitations
Logic bomb
26. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bridge
Macro virus
What range is a class B network?
UDP packet headers
27. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
File integrity checking work
NIDS advantages
OS Command Injection defenses
LAN
28. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
The four types of events reported by IDS
File integrity checking work
Anomaly analysis work
The TCP/IP model
29. Known - unknown - zero day
What categories do vulnerabilities fall into?
Rootkit
IDS data normalization
Types of viruses
30. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
When implementing protocols - what stack should be used?
The Uniform Protection to defense in depth
IDS data normalization
Logic bomb
31. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
Kismet
File integrity checking work
NAC
NIDS advantages
32. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
Rootkit
File Integrity checking work
IDS
Some malware propagation techniques
33. FIN 130 - ACK 131 - FIN 570 - ACK 571
Ciphertext
Some NIDS topology limitations
The transport layer
To close a TCP session
34. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Overview of TCP
A netcat listener
Kismet
NAC
35. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
IDS signature analysis work
Bus Topology
Some common UDP ports
Permutation
36. Handles transmissions across the physical media like wires - fiber - etc
The physical layer stack
Some common TCP ports
When implementing protocols - what stack should be used?
Ciphertext
37. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
The session layer
Some Pen Test techniques
NIDS advantages
Buffer overflow
38. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
No State Inspection ACK flag set
Risk
A blind FTP
Bus Topology
39. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
IDS data normalization
No State Inspection ACK flag set
The five threat vectors
Trojan horse
40. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Some network design objectives
ACK piggybacking
Rootkit
3-way handshake
41. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Firewall
Datagram length of a UDP packet
Some common UDP ports
OS Command Injection defenses
42. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
Parasitic malware
ATM work
Deep packet inspection
What categories do vulnerabilities fall into?
43. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
The protected enclave to defense in depth
Some other UDP based protocols
Some ways to bypass firewall protections
Wardriving
44. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
The conficker worm
Firewall
Bus Topology
Worms
45. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Integrity of Data
Deep packet inspection
Anomaly analysis work
Firewall
46. Going around with equipment to detect wireless networks
Wardriving
War Dialing
Plaintext
CIDR
47. Relies on executable code insertion and user interaction to spread
To establish a TCP session
The goals of cryptography
Parasitic malware
Stateful firewall
48. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
Defense in depth
Some malware capabilities
What range is a class C network?
Some NIDS topology limitations
49. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
LAN
HIDS monitor
File integrity checking work
Logic bomb
50. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Some common TCP ports
LAN
UDP packet headers
Trojan horse