SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Stateful firewalls maintain state of traffic flows
Firewall
Some types of malicious code
Stateful firewall
War Dialing
2. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
A netcat listener
Datagram length of a UDP packet
Hping
Checksum in UDP
3. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
A netcat listener
Log monitoring work?
No State Inspection ACK flag set
Rootkit
5. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Some reasons to use UDP over TCP
Network stumbler
Some ways to bypass firewall protections
DDoS attack
6. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
The data link layer
Some NIDS topology limitations
When talking about protocols and referencing layers - what stack is used
Port scan
7. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
ATM work
Some reasons to use TCP over UDP
Anomaly analysis work
The four basic approaches to defense in depth
8. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
Port scan
HIDS monitor
File Integrity checking work
IDS data normalization
9. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Anomaly analysis work
ATM work
Address Resolution Protocol (ARP)
Vulnerabilities
10. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Arbitrary substitution
Some common TCP ports
A network protocol
WAN
11. fast - with little fidelity - examines header information and limited payload data
Port scan
Types of viruses
Shallow packet inspection
IDS data normalization
12. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Honeypot
The four basic approaches to defense in depth
Denial of service
Wardriving
13. Malware - insider threat - natural disaster - terrorism - pandemic
NIDS challenges
Bridge
What range is a class C network?
What primary threats should be protected against
14. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Log monitoring work?
Anomaly analysis work
Bus Topology
Kismet
15. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
SQL Slammer Worm
Smurf attack
Boot record infector
Stateless packet filter
16. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
The protected enclave to defense in depth
File Integrity checking work
The OSI model
17. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
NIDS challenges
Hping
The transport layer
War Dialing
18. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Ack Piggybacking
Buffer overflow
The OSI Protocol Stack
Logic bomb
19. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Race conditions
Snort
The OSI model
CIDR
20. Unified data carrying service - replacing from replay and ATM
the application layer
ATM work
LAN
Multi protocol label switching
21. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
The physical layer stack
Best way to protect wireless networks
The threat vector analysis in defense in depth
The protected enclave to defense in depth
22. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
The threat vector analysis in defense in depth
EXE program infector
COM/Script program infector
The difference in stacks
23. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Some malware propagation techniques
Some network design objectives
Stateless packet filter
The four basic approaches to defense in depth
24. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Ack Piggybacking
Bridge
The Information Centric defense in depth
Integrity of Data
25. Full open - half open (stealth scan) - UDP - Ping
Nmap scanning techniques
The transport layer
Smurf attack
SQL Slammer Worm
26. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Stateless packet filter
Internet
Some other UDP based protocols
Group
27. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
The five threat vectors
Some reasons to use TCP over UDP
CIDR
Some firewall benefits
28. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Network stumbler
What primary threats should be protected against
Logic bomb
Alteration of code
29. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Some external threat concerns
Checksum in UDP
Rootkit
Social engineering
30. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Some ways to bypass firewall protections
IDS not
Anomaly analysis work
Honeyd
31. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Bridge
The Information Centric defense in depth
War Dialing
Risk
32. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
3-way handshake
A blind FTP
What ways should the crypto key be protected?
Router
33. Confidentiality - integrity - availability
The CIA triad
Brute force
Some malware propagation techniques
Race conditions
34. The practice of sending an ACK inside another packet going to the same destination
ACK piggybacking
The four basic approaches to defense in depth
The CIA triad
IDS
35. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Risk
Nmap
IDS not
TFTP
36. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some common UDP ports
Buffer overflow
TFTP
Some firewall benefits
37. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
A blind FTP
Honeyd
The three goals of security
The session layer
38. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
The different cable categories
Smurf attack
IDS data normalization
The three goals of security
39. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
TFTP
The conficker worm
Some common UDP ports
40. Relies on executable code insertion and user interaction to spread
Parasitic malware
Worms
When talking about protocols and referencing layers - what stack is used
NIDS advantages
41. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
OS Command Injection defenses
What range is a class A network?
The network layer
Honeypot
42. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Vulnerabilities
Bus Topology
Some disadvantages of honeypots
Browsing attack
43. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Some firewall benefits
Ciphertext
COM/Script program infector
Plaintext
44. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
The goals of cryptography
A blind FTP
Some Pen Test techniques
CIDR
45. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
The protected enclave to defense in depth
Some external threat concerns
IDS not
Some firewall benefits
46. Intellectual property - business goals - validated data - historical
What threats should be protected against - based on threat levels
Smurf attack
IDS
MAN
47. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
COM/Script program infector
Some other UDP based protocols
Integrity of Data
OS Command Injection defenses
48. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
Alteration of code
The presentation layer
A network protocol
ATM work
49. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Kismet
Nmap
Alteration of code
Honeypot
50. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Some common TCP ports
Hubs
A netmask
Some firewall benefits