SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Arbitrary substitution
Integrity of Data
Rootkit
IDS not
2. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
The CIA triad
When implementing protocols - what stack should be used?
Nmap
The session layer
3. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
The conficker worm
When setting up a virtual circuit
Arbitrary substitution
the application layer
4. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Macro virus
Some disadvantages of honeypots
Nmap scanning techniques
WAN
5. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
What primary threats should be protected against
Some reasons to use UDP over TCP
A network protocol
IDS data normalization
6. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Port scan
What's an easy way to test encryption?
The presentation layer
Types of viruses
7. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
DDoS attack
Some reasons to use UDP over TCP
ATM work
A network protocol
8. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
The four types of events reported by IDS
Some ways to bypass firewall protections
Address Resolution Protocol (ARP)
The CIA triad
9. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
ATM work
Firewall
Denial of service
3-way handshake
10. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Parasitic malware
When implementing protocols - what stack should be used?
Brute force
UDP packet headers
11. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Buffer overflow
Wardriving
Some NIDS topology limitations
CIDR
12. Attaches itself to existing program files and activated when the exe is launched
When talking about protocols and referencing layers - what stack is used
DDoS attack
Program infector
Worms
13. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Social engineering
OS Command Injection defenses
Bus Topology
WAN
14. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
SYN flood
The difference in stacks
The session layer
Permutation
15. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
MAN
Some malware capabilities
The goals of cryptography
Some common UDP ports
16. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
UDP packet headers
3-way handshake
The TCP/IP model
17. It handles the establishment and maintenance of connections between systems
Trap door
WAN
ATM work
The session layer
18. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Router
File integrity checking work
The conficker worm
MAN
19. Bits of code embedded in programs to quickly gain access at a later time
PAN
Remote maintenance
Trap door
Some network design objectives
20. It makes sure the data sent from one side to the other is in a format useful to the other side
Some firewall challenges
Checksum in UDP
The presentation layer
Bus Topology
21. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
MAN
Some reasons to use UDP over TCP
Address resolution protocol
Some firewall benefits
22. An attempt to gain access by bombarding it with guesses until the password is found.
The four types of events reported by IDS
Brute force
The Uniform Protection to defense in depth
Honeypot
23. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The transport layer
UDP packet headers
A blind FTP
No State Inspection ACK flag set
24. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Asynchronous Transfer Mode
IDS signature analysis work
Some common TCP ports
Proxy or application gateway
25. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
The CIA triad
Denial of service
Internet
Rootkit
26. Provides insight into the tactics - motives - and attacker tools
Overview of TCP
Internet
War Dialing
Some honeypot advantages
27. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Some malware capabilities
Some disadvantages of honeypots
Trojan horse
DDoS attack
28. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The protected enclave to defense in depth
the application layer
The threat vector analysis in defense in depth
Remote maintenance
29. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
Best way to protect wireless networks
Asynchronous Transfer Mode
Group
Address resolution protocol
30. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
Multi protocol label switching
NIDS advantages
Buffer overflow
Browsing attack
31. OSI
the application layer
When talking about protocols and referencing layers - what stack is used
Smurf attack
Total cell size for asynchronous transfer mode (ATM)
32. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
What range is a class A network?
Brute force
What categories do vulnerabilities fall into?
IDS signature analysis work
33. Stateful firewalls maintain state of traffic flows
Deep packet inspection
The transport layer
Anomaly analysis work
Stateful firewall
34. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Some external threat concerns
Some reasons to use TCP over UDP
A blind FTP
Some disadvantages of honeypots
35. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
Some Pen Test techniques
Some firewall challenges
What primary threats should be protected against
File Integrity checking work
36. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
Firewall
CIDR
The different cable categories
Stateless packet filter
37. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Some reasons to use UDP over TCP
DDoS attack
Router
38. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
EXE program infector
Address resolution protocol
Race conditions
File integrity checking work
39. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
Social engineering
Some reasons to use TCP over UDP
IDS
A netmask
40. The practice of sending an ACK inside another packet going to the same destination
When implementing protocols - what stack should be used?
Wardriving
File integrity checking work
ACK piggybacking
41. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Permutation
Defense in depth
TFTP
The threat vector analysis in defense in depth
42. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
LAN
Snort
Some firewall benefits
OS Command Injection defenses
43. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
The conficker worm
Social engineering
Some reasons to use TCP over UDP
Stateful firewall
44. Confidentiality - integrity - availability
The CIA triad
Some common TCP ports
Rootkit
The session layer
45. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Datagram length of a UDP packet
Some common UDP ports
TFTP
Defense in depth
46. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
The OSI Protocol Stack
Datagram length of a UDP packet
The CIA triad
SYN flood
48. Network scanner.
A netcat listener
Nmap
Group
Overview of TCP
49. Known - unknown - zero day
When setting up a virtual circuit
Proxy or application gateway
ATM work
What categories do vulnerabilities fall into?
50. It interacts with the application layer to determine which network services will be required
Datagram length of a UDP packet
Some common UDP ports
What's an easy way to test encryption?
the application layer