SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Nmap
Browsing attack
The four basic approaches to defense in depth
File integrity checking work
2. 53 bytes - 48 bytes for data - 5 bytes for the header
Total cell size for asynchronous transfer mode (ATM)
Bus Topology
Nmap scanning techniques
Risk
3. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
Overview of TCP
EXE program infector
What range is a class A network?
File Integrity checking work
4. Infects MBR - no network spreading potential
EXE program infector
The CIA triad
Boot record infector
The threat vector analysis in defense in depth
5. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
What threats should be protected against - based on threat levels
The different cable categories
What range is a class C network?
When setting up a virtual circuit
6. A cracking tool inserted into the OS that allows the attacker to do as they please.
NAC
Rootkit
ACK piggybacking
Trap door
7. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
The protected enclave to defense in depth
Ack Piggybacking
Arbitrary substitution
Trap door
8. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Rotation?
NAC
Alteration of code
Some common TCP ports
9. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
When implementing protocols - what stack should be used?
NIDS advantages
Program infector
EXE program infector
10. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Honeyd
Permutation
Some types of malicious code
War Dialing
11. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Best way to protect wireless networks
PAN
The TCP/IP model
The Uniform Protection to defense in depth
12. Attaches itself to existing program files and activated when the exe is launched
Types of ATM virtual circuits
Program infector
Bus Topology
To establish a TCP session
13. Known - unknown - zero day
What categories do vulnerabilities fall into?
Router
The threat vector analysis in defense in depth
Wardriving
14. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
What categories do vulnerabilities fall into?
Address resolution protocol
When implementing protocols - what stack should be used?
Overview of TCP
15. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The transport layer
Risk
What's an easy way to test encryption?
Switches
16. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
Stateless packet filter
IDS data normalization
Buffer overflow
Some network design objectives
17. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Some network design objectives
The OSI Protocol Stack
HIDS monitor
What ways should the crypto key be protected?
18. Simple attack done by simply browsing available information that's allowed on a local network.
Browsing attack
Shallow packet inspection
DDoS attack
Honeyd
19. Unencrypted message in its original form
EXE program infector
Plaintext
Boot record infector
NIDS challenges
20. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
File Integrity checking work
Ciphertext
Remote maintenance
Arbitrary substitution
21. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Some firewall challenges
Logic bomb
DDoS attack
Brute force
22. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Log monitoring work?
Router
What range is a class A network?
TFTP
23. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
The protected enclave to defense in depth
Rotation?
Some reasons to use UDP over TCP
Deep packet inspection
24. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
Total cell size for asynchronous transfer mode (ATM)
The TCP/IP model
What range is a class C network?
The different cable categories
25. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Bus Topology
ACK piggybacking
The different cable categories
When implementing protocols - what stack should be used?
26. It makes sure the data sent from one side to the other is in a format useful to the other side
What range is a class C network?
A blind FTP
The presentation layer
Remote maintenance
27. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
File integrity checking work
TFTP
The five threat vectors
the application layer
28. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Snort
Logic bomb
The threat vector analysis in defense in depth
Remote maintenance
29. Going around with equipment to detect wireless networks
Smurf attack
Wardriving
Some network design objectives
When setting up a virtual circuit
30. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Deep packet inspection
Firewall
Some reasons to use TCP over UDP
The TCP/IP model
31. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
Port scan
A netmask
PAN
Some firewall challenges
32. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Switches
Asynchronous Transfer Mode
Ack Piggybacking
A network protocol
33. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
What primary threats should be protected against
Types of ATM virtual circuits
ATM work
Some common TCP ports
34. Syn - Syn/Ack - Ack
To establish a TCP session
3-way handshake
What ways should the crypto key be protected?
A netmask
35. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Firewall
What range is a class B network?
The Information Centric defense in depth
36. An attempt to gain access by bombarding it with guesses until the password is found.
File Integrity checking work
The data link layer
Group
Brute force
37. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Port scan
A netmask
Program infector
What range is a class A network?
38. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Defense in depth
SYN flood
Denial of service
Deep packet inspection
39. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
A netcat listener
A network protocol
Vulnerabilities
The network layer
40. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
What range is a class B network?
The Uniform Protection to defense in depth
the application layer
When setting up a virtual circuit
41. Intrusion detection system - it reports attacks against monitored systems/networks
The conficker worm
LAN
Some common UDP ports
IDS
42. The practice of sending an ACK inside another packet going to the same destination
Some malware capabilities
ACK piggybacking
Honeyd
The four basic approaches to defense in depth
43. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
Honeyd
Checksum in UDP
Some reasons to use UDP over TCP
ACK piggybacking
44. fast - with little fidelity - examines header information and limited payload data
Shallow packet inspection
The goals of cryptography
The four types of events reported by IDS
LAN
45. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Some reasons to use TCP over UDP
The Information Centric defense in depth
NIDS challenges
Alteration of code
46. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Honeyd
The session layer
Plaintext
OS Command Injection defenses
47. Provides insight into the tactics - motives - and attacker tools
When setting up a virtual circuit
Rootkit
The OSI model
Some honeypot advantages
48. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Firewall
Some common UDP ports
Bridge
Some network design objectives
49. Confidentiality - integrity - availability
The three goals of security
The difference in stacks
The different cable categories
Shallow packet inspection
50. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
NAC
File integrity checking work
Datagram length of a UDP packet
The data link layer