SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The data link layer
The transport layer
Some malware propagation techniques
IDS not
2. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
PAN
Bridge
Trojan horse
Arbitrary substitution
3. Confidentiality - symmetric encryption
Brute force
The goals of cryptography
Social engineering
Snort
4. Infects MBR - no network spreading potential
File integrity checking work
No State Inspection ACK flag set
Boot record infector
Some reasons to use TCP over UDP
5. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Nmap
3-way handshake
Kismet
Honeypot
6. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Some reasons to use TCP over UDP
No State Inspection ACK flag set
Port scan
Rotation?
7. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Stateful firewall
Worms
Some honeypot advantages
Stateless packet filter
8. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
DDoS attack
Honeypot
To establish a TCP session
CIDR
9. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Ack Piggybacking
NAC
What categories do vulnerabilities fall into?
Macro virus
10. Unified data carrying service - replacing from replay and ATM
Multi protocol label switching
Types of viruses
Hubs
Address Resolution Protocol (ARP)
11. One is for talking - one is for implementing
The difference in stacks
What range is a class A network?
Buffer overflow
WAN
12. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Remote maintenance
Some network design objectives
The presentation layer
Types of viruses
13. Confidentiality - integrity - availability
Worms
Honeypot
Router
The three goals of security
14. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
Bus Topology
IDS signature analysis work
Integrity of Data
The difference in stacks
15. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Internet
Switches
Log monitoring work?
The Uniform Protection to defense in depth
16. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
The three goals of security
UDP packet headers
Types of ATM virtual circuits
What's an easy way to test encryption?
17. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
IDS
DDoS attack
Some honeypot advantages
Checksum in UDP
18. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Some common UDP ports
SYN flood
The OSI Protocol Stack
Ciphertext
19. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some firewall challenges
Trojan horse
EXE program infector
Plaintext
20. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
To close a TCP session
ATM work
Nmap
Honeyd
21. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
The presentation layer
Some external threat concerns
IDS signature analysis work
What's a VLAN
22. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
The threat vector analysis in defense in depth
Some ways to bypass firewall protections
MAN
Some Pen Test techniques
23. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
UDP packet headers
The network layer
Some types of malicious code
NIDS advantages
24. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
File Integrity checking work
Stateful firewall
Datagram length of a UDP packet
Log monitoring work?
25. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Vulnerabilities
WAN
Trap door
Stateful firewall
26. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Some FTP dangers
Types of viruses
Port scan
The conficker worm
27. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
The threat vector analysis in defense in depth
MAN
What range is a class B network?
What threats should be protected against - based on threat levels
28. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some NIDS topology limitations
Stateful firewall
Some types of malicious code
Best way to protect wireless networks
29. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
File Integrity checking work
What primary threats should be protected against
A netcat listener
Remote maintenance
30. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
The protected enclave to defense in depth
Trap door
File integrity checking work
Remote maintenance
31. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Some FTP dangers
NIDS challenges
HIDS monitor
CIDR
32. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
A netmask
Shallow packet inspection
Smurf attack
Remote maintenance
33. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Defense in depth
When talking about protocols and referencing layers - what stack is used
Logic bomb
A network protocol
34. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Integrity of Data
The data link layer
Race conditions
Anomaly analysis work
35. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
SQL Slammer Worm
Types of ATM virtual circuits
Network stumbler
IDS data normalization
36. Network scanner.
Types of viruses
Arbitrary substitution
Nmap
A blind FTP
37. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
When talking about protocols and referencing layers - what stack is used
Port scan
EXE program infector
What threats should be protected against - based on threat levels
38. Considered to be a perimeter device
Group
What's an easy way to test encryption?
Logic bomb
Router
39. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Buffer overflow
The network layer
Some disadvantages of honeypots
Some firewall benefits
40. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Snort
Social engineering
The difference in stacks
the application layer
41. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
HIDS monitor
Some reasons to use UDP over TCP
The different cable categories
42. Protected at rest - protected in transit - secure the key
What ways should the crypto key be protected?
A netmask
Some common TCP ports
Plaintext
43. It makes sure the data sent from one side to the other is in a format useful to the other side
Some ways to bypass firewall protections
The data link layer
The presentation layer
Ack Piggybacking
44. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Trojan horse
Some common UDP ports
The difference in stacks
IDS signature analysis work
45. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
CIDR
Checksum in UDP
Worms
IDS not
46. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Bus Topology
Social engineering
What range is a class A network?
TFTP
47. Known - unknown - zero day
3-way handshake
Some NIDS topology limitations
ACK piggybacking
What categories do vulnerabilities fall into?
48. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Plaintext
LAN
Checksum in UDP
Ack Piggybacking
49. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
A netcat listener
Race conditions
Rotation?
Some ways to bypass firewall protections
50. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Best way to protect wireless networks
Types of viruses
Snort
Defense in depth