SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
SYN flood
Some reasons to use UDP over TCP
ATM work
Stateful firewall
2. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Remote maintenance
What ways should the crypto key be protected?
Worms
The OSI Protocol Stack
3. The practice of sending an ACK inside another packet going to the same destination
The five threat vectors
Wardriving
A netmask
ACK piggybacking
4. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
Some FTP dangers
The Uniform Protection to defense in depth
Worms
The conficker worm
5. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Some common TCP ports
Some network design objectives
Snort
Overview of TCP
6. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
What primary threats should be protected against
File Integrity checking work
Some network design objectives
NIDS challenges
7. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Some FTP dangers
The three goals of security
Plaintext
Kismet
8. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
NAC
Race conditions
Snort
Internet
9. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Denial of service
the application layer
Macro virus
Network stumbler
10. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
the application layer
The TCP/IP model
ACK piggybacking
Group
11. Intellectual property - business goals - validated data - historical
What threats should be protected against - based on threat levels
The four types of events reported by IDS
File Integrity checking work
Ack Piggybacking
12. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
PAN
No State Inspection ACK flag set
Some disadvantages of honeypots
OS Command Injection defenses
13. Known - unknown - zero day
Hubs
What categories do vulnerabilities fall into?
Some reasons to use TCP over UDP
Some firewall benefits
14. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Risk
When implementing protocols - what stack should be used?
NIDS challenges
Anomaly analysis work
15. Handles transmissions across the physical media like wires - fiber - etc
Race conditions
What primary threats should be protected against
Stateless packet filter
The physical layer stack
16. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Some reasons to use UDP over TCP
Snort
Integrity of Data
The data link layer
17. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
What threats should be protected against - based on threat levels
Some disadvantages of honeypots
SQL Slammer Worm
The OSI Protocol Stack
18. Provides insight into the tactics - motives - and attacker tools
Some honeypot advantages
The OSI Protocol Stack
The four basic approaches to defense in depth
The CIA triad
19. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Macro virus
Browsing attack
Hubs
Address Resolution Protocol (ARP)
20. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
the application layer
Some NIDS topology limitations
Some FTP dangers
Race conditions
21. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
UDP packet headers
Social engineering
Multi protocol label switching
the application layer
22. FIN 130 - ACK 131 - FIN 570 - ACK 571
ATM work
NIDS advantages
To close a TCP session
Router
23. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
HIDS monitor
SYN flood
Types of viruses
The four basic approaches to defense in depth
24. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Vulnerabilities
Some reasons to use UDP over TCP
Group
The CIA triad
25. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
A network protocol
Overview of TCP
The conficker worm
A netcat listener
26. True positive - false positive - true negative - false negative
The physical layer stack
Log monitoring work?
What categories do vulnerabilities fall into?
The four types of events reported by IDS
27. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
A netmask
Wardriving
The Information Centric defense in depth
The four basic approaches to defense in depth
28. Intrusion detection system - it reports attacks against monitored systems/networks
IDS
NAC
Vulnerabilities
PAN
29. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
Some firewall benefits
The goals of cryptography
File Integrity checking work
30. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
When implementing protocols - what stack should be used?
Group
The threat vector analysis in defense in depth
NAC
31. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
A blind FTP
Switches
A netmask
IDS not
32. Network scanner.
Nmap
EXE program infector
Permutation
Ack Piggybacking
33. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
WAN
The difference in stacks
Snort
Some common TCP ports
34. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Some reasons to use UDP over TCP
Hping
IDS data normalization
When implementing protocols - what stack should be used?
35. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Switches
NAC
Social engineering
Some other UDP based protocols
36. Infects MBR - no network spreading potential
Browsing attack
Boot record infector
Brute force
Wardriving
37. logic bomb - trojan horse - trap door
Multi protocol label switching
Trojan horse
Some types of malicious code
Boot record infector
38. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
What range is a class B network?
What range is a class A network?
WAN
What's an easy way to test encryption?
39. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Some ways to bypass firewall protections
What range is a class B network?
Buffer overflow
Permutation
40. Stateful firewalls maintain state of traffic flows
LAN
HIDS monitor
Buffer overflow
Stateful firewall
41. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Macro virus
Network stumbler
The goals of cryptography
The TCP/IP model
42. Unencrypted message in its original form
Some ways to bypass firewall protections
Plaintext
Integrity of Data
Some network design objectives
43. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Checksum in UDP
Kismet
Some disadvantages of honeypots
Ciphertext
44. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some firewall challenges
Kismet
Switches
Logic bomb
45. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
3-way handshake
Asynchronous Transfer Mode
The presentation layer
Defense in depth
46. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
SQL Slammer Worm
What range is a class B network?
Rotation?
47. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Stateless packet filter
The data link layer
Nmap
Overview of TCP
48. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
Hping
LAN
Boot record infector
Some ways to bypass firewall protections
49. Going around with equipment to detect wireless networks
Wardriving
Some common TCP ports
ATM work
A network protocol
50. Bits of code embedded in programs to quickly gain access at a later time
Some network design objectives
WAN
Trap door
Asynchronous Transfer Mode