SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Overview of TCP
IDS signature analysis work
3-way handshake
File integrity checking work
2. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
IDS not
Some network design objectives
What's an easy way to test encryption?
Browsing attack
3. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
What threats should be protected against - based on threat levels
Some types of malicious code
IDS not
Buffer overflow
4. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
The difference in stacks
Group
Some external threat concerns
Switches
5. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
The Information Centric defense in depth
Multi protocol label switching
The protected enclave to defense in depth
6. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Logic bomb
Multi protocol label switching
Remote maintenance
The four types of events reported by IDS
7. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Some Pen Test techniques
MAN
Anomaly analysis work
Network stumbler
8. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Stateful firewall
OS Command Injection defenses
The transport layer
WAN
9. Considered to be a perimeter device
Some common UDP ports
Bus Topology
Router
Vulnerabilities
10. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Some FTP dangers
Some common UDP ports
Log monitoring work?
LAN
11. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Smurf attack
The Uniform Protection to defense in depth
Arbitrary substitution
The threat vector analysis in defense in depth
12. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Ciphertext
Defense in depth
Proxy or application gateway
Network stumbler
13. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
A blind FTP
File Integrity checking work
Anomaly analysis work
What range is a class B network?
14. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Types of viruses
Smurf attack
Some reasons to use UDP over TCP
15. It interacts with the application layer to determine which network services will be required
SYN flood
Some NIDS topology limitations
Honeypot
the application layer
16. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
No State Inspection ACK flag set
NIDS challenges
What range is a class A network?
Integrity of Data
17. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
Some network design objectives
Best way to protect wireless networks
A netcat listener
Total cell size for asynchronous transfer mode (ATM)
18. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Social engineering
DDoS attack
Address Resolution Protocol (ARP)
Arbitrary substitution
19. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Some reasons to use UDP over TCP
Kismet
The transport layer
Firewall
20. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The TCP/IP model
What categories do vulnerabilities fall into?
Some firewall challenges
To establish a TCP session
21. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some firewall challenges
Some other UDP based protocols
IDS
Some malware propagation techniques
22. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
PAN
Checksum in UDP
Log monitoring work?
Some firewall benefits
24. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
3-way handshake
Proxy or application gateway
Overview of TCP
The OSI Protocol Stack
25. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Group
HIDS monitor
Some common TCP ports
What range is a class A network?
26. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
the application layer
A blind FTP
Port scan
The Information Centric defense in depth
27. Personal area network - phone tethering - bluetooth - etc
Ciphertext
PAN
Integrity of Data
Anomaly analysis work
28. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some firewall benefits
The threat vector analysis in defense in depth
Some common TCP ports
SYN flood
29. Uniform protection - protected enclaves - information centric - threat vector analysis
The four basic approaches to defense in depth
ATM work
Smurf attack
The physical layer stack
30. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
The Information Centric defense in depth
A netcat listener
When implementing protocols - what stack should be used?
Deep packet inspection
31. Message in its encrypted form
The Uniform Protection to defense in depth
Plaintext
Ciphertext
Race conditions
32. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Shallow packet inspection
War Dialing
Some malware propagation techniques
UDP packet headers
33. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
Trap door
Network stumbler
Buffer overflow
LAN
34. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Best way to protect wireless networks
Some ways to bypass firewall protections
CIDR
Bridge
35. A cracking tool inserted into the OS that allows the attacker to do as they please.
The CIA triad
Stateful firewall
Asynchronous Transfer Mode
Rootkit
36. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
CIDR
File integrity checking work
IDS signature analysis work
Anomaly analysis work
37. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Trap door
What categories do vulnerabilities fall into?
The TCP/IP model
Some disadvantages of honeypots
38. destruction of data - leaking confidential information - providing backdoor access
What primary threats should be protected against
Some malware capabilities
NIDS challenges
Nmap scanning techniques
39. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Worms
Some firewall benefits
Datagram length of a UDP packet
What range is a class B network?
40. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Some malware capabilities
Stateless packet filter
The different cable categories
The network layer
41. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
HIDS monitor
File Integrity checking work
Asynchronous Transfer Mode
Some ways to bypass firewall protections
42. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
Port scan
the application layer
OS Command Injection defenses
IDS data normalization
43. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Permutation
Network stumbler
The data link layer
Alteration of code
44. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Network stumbler
Honeypot
The presentation layer
NAC
45. Confidentiality - integrity - availability
Rootkit
The three goals of security
CIDR
The CIA triad
46. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
A netmask
NIDS advantages
File Integrity checking work
What primary threats should be protected against
47. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
CIDR
Overview of TCP
To establish a TCP session
The network layer
48. It makes sure the data sent from one side to the other is in a format useful to the other side
Trojan horse
When setting up a virtual circuit
The presentation layer
Anomaly analysis work
49. One is for talking - one is for implementing
Router
The presentation layer
The difference in stacks
ATM work
50. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some NIDS topology limitations
War Dialing
Deep packet inspection
Alteration of code