SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Known - unknown - zero day
What categories do vulnerabilities fall into?
Asynchronous Transfer Mode
The four types of events reported by IDS
Some external threat concerns
2. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Port scan
What range is a class A network?
Overview of TCP
UDP packet headers
3. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
Permutation
Nmap scanning techniques
A netmask
Some firewall benefits
4. It handles the establishment and maintenance of connections between systems
The session layer
Some network design objectives
Smurf attack
3-way handshake
5. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Alteration of code
A netmask
Some common UDP ports
Some external threat concerns
6. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Internet
Types of ATM virtual circuits
Some NIDS topology limitations
Proxy or application gateway
7. One is for talking - one is for implementing
Worms
Some common UDP ports
The difference in stacks
Bus Topology
8. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Multi protocol label switching
Some malware propagation techniques
Some common TCP ports
Defense in depth
9. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
To close a TCP session
Some ways to bypass firewall protections
A blind FTP
Log monitoring work?
10. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
The Uniform Protection to defense in depth
What range is a class B network?
ATM work
The Information Centric defense in depth
11. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Snort
Shallow packet inspection
Stateful firewall
Integrity of Data
12. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
The difference in stacks
Best way to protect wireless networks
The data link layer
Some firewall challenges
13. True positive - false positive - true negative - false negative
The physical layer stack
File Integrity checking work
The four types of events reported by IDS
Overview of TCP
14. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Some malware propagation techniques
The Uniform Protection to defense in depth
MAN
Some honeypot advantages
15. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
The data link layer
WAN
Deep packet inspection
Some Pen Test techniques
16. Network scanner.
IDS signature analysis work
Internet
When setting up a virtual circuit
Nmap
17. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Permutation
PAN
Remote maintenance
Hubs
18. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The conficker worm
The transport layer
Anomaly analysis work
Some malware capabilities
19. destruction of data - leaking confidential information - providing backdoor access
What's an easy way to test encryption?
Program infector
Some malware capabilities
Snort
20. Unencrypted message in its original form
Some NIDS topology limitations
NIDS advantages
Plaintext
Some honeypot advantages
21. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
Some firewall benefits
Some NIDS topology limitations
When setting up a virtual circuit
What range is a class C network?
22. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
MAN
Stateful firewall
Asynchronous Transfer Mode
the application layer
23. Full open - half open (stealth scan) - UDP - Ping
Address Resolution Protocol (ARP)
A netcat listener
ACK piggybacking
Nmap scanning techniques
24. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Asynchronous Transfer Mode
Some honeypot advantages
Denial of service
The four basic approaches to defense in depth
25. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
What's a VLAN
Types of viruses
EXE program infector
Port scan
26. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Address Resolution Protocol (ARP)
Some FTP dangers
Some firewall benefits
Some reasons to use UDP over TCP
27. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Integrity of Data
The TCP/IP model
Address Resolution Protocol (ARP)
When implementing protocols - what stack should be used?
28. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
the application layer
Some honeypot advantages
Social engineering
NIDS advantages
29. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Group
Wardriving
What's an easy way to test encryption?
NIDS challenges
30. Handles transmissions across the physical media like wires - fiber - etc
The physical layer stack
Buffer overflow
Some ways to bypass firewall protections
The protected enclave to defense in depth
31. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
Types of viruses
OS Command Injection defenses
SQL Slammer Worm
Risk
32. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. Relies on executable code insertion and user interaction to spread
IDS data normalization
Checksum in UDP
Total cell size for asynchronous transfer mode (ATM)
Parasitic malware
34. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS data normalization
Firewall
Some ways to bypass firewall protections
Proxy or application gateway
35. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
The presentation layer
The four basic approaches to defense in depth
Group
Asynchronous Transfer Mode
36. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Datagram length of a UDP packet
Some external threat concerns
Social engineering
No State Inspection ACK flag set
37. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Trap door
Integrity of Data
Snort
Firewall
38. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
TFTP
A netcat listener
Stateful firewall
Plaintext
39. Attaches itself to existing program files and activated when the exe is launched
Plaintext
Some firewall challenges
The four basic approaches to defense in depth
Program infector
40. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Trojan horse
Risk
When implementing protocols - what stack should be used?
When setting up a virtual circuit
41. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Overview of TCP
Rotation?
OS Command Injection defenses
The difference in stacks
42. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
The network layer
Kismet
The Uniform Protection to defense in depth
the application layer
43. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Asynchronous Transfer Mode
File integrity checking work
IDS signature analysis work
Hubs
44. Simple attack done by simply browsing available information that's allowed on a local network.
Browsing attack
TFTP
ATM work
Some disadvantages of honeypots
45. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
3-way handshake
Some network design objectives
Social engineering
NIDS challenges
46. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Some ways to bypass firewall protections
Firewall
The protected enclave to defense in depth
File integrity checking work
47. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
OS Command Injection defenses
Parasitic malware
PAN
The OSI Protocol Stack
48. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Trojan horse
The three goals of security
Nmap scanning techniques
Some malware capabilities
49. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
IDS
Shallow packet inspection
LAN
The OSI model
50. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
DDoS attack
The four basic approaches to defense in depth
The transport layer
Some external threat concerns
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests