SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Anomaly analysis work
Some firewall challenges
The threat vector analysis in defense in depth
When talking about protocols and referencing layers - what stack is used
2. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Some other UDP based protocols
Rotation?
Nmap scanning techniques
Shallow packet inspection
3. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
Rootkit
The data link layer
Logic bomb
SQL Slammer Worm
4. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
The threat vector analysis in defense in depth
What's an easy way to test encryption?
Trojan horse
OS Command Injection defenses
5. Intrusion detection system - it reports attacks against monitored systems/networks
A netmask
CIDR
Some other UDP based protocols
IDS
6. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
OS Command Injection defenses
Alteration of code
Vulnerabilities
The data link layer
7. fast - with little fidelity - examines header information and limited payload data
Some NIDS topology limitations
Shallow packet inspection
Logic bomb
The four basic approaches to defense in depth
8. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Multi protocol label switching
Kismet
What primary threats should be protected against
Stateful firewall
9. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Alteration of code
Best way to protect wireless networks
Some common TCP ports
MAN
10. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
CIDR
Social engineering
SYN flood
The network layer
11. Provides insight into the tactics - motives - and attacker tools
Some honeypot advantages
What primary threats should be protected against
When setting up a virtual circuit
IDS not
12. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
NIDS challenges
Best way to protect wireless networks
Datagram length of a UDP packet
CIDR
13. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Some ways to bypass firewall protections
The data link layer
Stateless packet filter
Best way to protect wireless networks
14. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Smurf attack
EXE program infector
Network stumbler
WAN
15. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
The five threat vectors
UDP packet headers
The OSI model
Honeyd
16. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
Checksum in UDP
SQL Slammer Worm
The network layer
File Integrity checking work
17. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Ciphertext
Defense in depth
Ack Piggybacking
Browsing attack
18. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Some malware propagation techniques
Address Resolution Protocol (ARP)
Some external threat concerns
Honeypot
19. OSI
The data link layer
When talking about protocols and referencing layers - what stack is used
The goals of cryptography
Buffer overflow
20. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
What range is a class B network?
PAN
Alteration of code
A netcat listener
21. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Macro virus
Buffer overflow
Logic bomb
Wardriving
22. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Rotation?
Risk
Denial of service
File Integrity checking work
23. Bits of code embedded in programs to quickly gain access at a later time
Nmap scanning techniques
Trap door
The different cable categories
Types of ATM virtual circuits
24. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Some reasons to use TCP over UDP
Integrity of Data
Anomaly analysis work
Trap door
25. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Denial of service
COM/Script program infector
Smurf attack
What range is a class B network?
26. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
OS Command Injection defenses
The conficker worm
Port scan
Hubs
27. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Hubs
A network protocol
Kismet
Some disadvantages of honeypots
28. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Overview of TCP
File Integrity checking work
the application layer
Types of ATM virtual circuits
29. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
The conficker worm
Shallow packet inspection
Some firewall benefits
The different cable categories
30. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
the application layer
COM/Script program infector
A network protocol
31. Going around with equipment to detect wireless networks
Wardriving
Some malware capabilities
When talking about protocols and referencing layers - what stack is used
Group
32. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Honeyd
Some types of malicious code
Anomaly analysis work
What range is a class B network?
33. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Buffer overflow
Integrity of Data
NIDS advantages
Some FTP dangers
34. Intellectual property - business goals - validated data - historical
What threats should be protected against - based on threat levels
Multi protocol label switching
Honeypot
Integrity of Data
35. logic bomb - trojan horse - trap door
Parasitic malware
Some types of malicious code
Hping
SYN flood
36. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Nmap scanning techniques
A network protocol
Hping
37. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Types of ATM virtual circuits
Rotation?
Nmap scanning techniques
File integrity checking work
38. Known - unknown - zero day
IDS not
Hubs
What categories do vulnerabilities fall into?
EXE program infector
39. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Port scan
To close a TCP session
DDoS attack
The OSI model
40. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Social engineering
The threat vector analysis in defense in depth
Checksum in UDP
Total cell size for asynchronous transfer mode (ATM)
41. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The TCP/IP model
Remote maintenance
Nmap scanning techniques
CIDR
42. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bridge
When setting up a virtual circuit
When implementing protocols - what stack should be used?
IDS not
43. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Some network design objectives
Worms
NIDS advantages
IDS not
44. It interacts with the application layer to determine which network services will be required
the application layer
Some external threat concerns
NAC
Some disadvantages of honeypots
45. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
NIDS challenges
Some firewall benefits
Some network design objectives
Vulnerabilities
46. Confidentiality - integrity - availability
The three goals of security
The four types of events reported by IDS
Some reasons to use UDP over TCP
What categories do vulnerabilities fall into?
47. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Firewall
The conficker worm
What categories do vulnerabilities fall into?
The three goals of security
48. FIN 130 - ACK 131 - FIN 570 - ACK 571
Types of viruses
The transport layer
To close a TCP session
File integrity checking work
49. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
The OSI Protocol Stack
Hping
TFTP
the application layer
50. Connects many WANs - MANs - and LANs - provided via ISP
MAN
NIDS challenges
Internet
NAC