SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
TFTP
CIDR
The Uniform Protection to defense in depth
2. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
The threat vector analysis in defense in depth
The five threat vectors
Some other UDP based protocols
What primary threats should be protected against
3. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
IDS not
Firewall
OS Command Injection defenses
The Uniform Protection to defense in depth
4. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
War Dialing
Internet
IDS data normalization
Ack Piggybacking
5. It interacts with the application layer to determine which network services will be required
the application layer
Nmap
Some reasons to use UDP over TCP
IDS
6. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
What threats should be protected against - based on threat levels
Alteration of code
Proxy or application gateway
Integrity of Data
7. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
The Uniform Protection to defense in depth
Port scan
Some external threat concerns
Asynchronous Transfer Mode
8. Going around with equipment to detect wireless networks
Some firewall challenges
DDoS attack
Social engineering
Wardriving
9. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
LAN
The Information Centric defense in depth
Buffer overflow
Macro virus
10. The Practice of sending an ACK inside another packet going to the same destination
A netcat listener
Arbitrary substitution
Denial of service
Ack Piggybacking
11. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
Buffer overflow
The session layer
Rootkit
File integrity checking work
12. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
What's a VLAN
Types of viruses
The four types of events reported by IDS
13. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
SYN flood
Remote maintenance
Snort
What range is a class A network?
14. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Smurf attack
Group
Datagram length of a UDP packet
Parasitic malware
15. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Logic bomb
File integrity checking work
Types of ATM virtual circuits
A netcat listener
16. Intellectual property - business goals - validated data - historical
What threats should be protected against - based on threat levels
COM/Script program infector
IDS data normalization
Arbitrary substitution
17. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. One is for talking - one is for implementing
When talking about protocols and referencing layers - what stack is used
Anomaly analysis work
The difference in stacks
Snort
19. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
What categories do vulnerabilities fall into?
Macro virus
Integrity of Data
Browsing attack
20. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Proxy or application gateway
Total cell size for asynchronous transfer mode (ATM)
The TCP/IP model
The protected enclave to defense in depth
21. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
To close a TCP session
Datagram length of a UDP packet
HIDS monitor
Some FTP dangers
22. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Remote maintenance
Asynchronous Transfer Mode
ATM work
A network protocol
23. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
The transport layer
Deep packet inspection
EXE program infector
Log monitoring work?
24. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
CIDR
Some firewall challenges
WAN
Some FTP dangers
25. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
DDoS attack
Integrity of Data
Some network design objectives
Some Pen Test techniques
26. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Types of viruses
Some common TCP ports
The different cable categories
NIDS advantages
27. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Parasitic malware
Trojan horse
IDS
Program infector
28. Confidentiality - integrity - availability
The four basic approaches to defense in depth
The CIA triad
OS Command Injection defenses
The conficker worm
29. Protected at rest - protected in transit - secure the key
Trap door
What ways should the crypto key be protected?
Program infector
What primary threats should be protected against
30. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Best way to protect wireless networks
The data link layer
Honeyd
Datagram length of a UDP packet
31. Attaches itself to existing program files and activated when the exe is launched
Program infector
Vulnerabilities
The threat vector analysis in defense in depth
Total cell size for asynchronous transfer mode (ATM)
32. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
What range is a class C network?
Types of ATM virtual circuits
Honeypot
The presentation layer
33. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Total cell size for asynchronous transfer mode (ATM)
Arbitrary substitution
The session layer
the application layer
34. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
What range is a class C network?
What ways should the crypto key be protected?
The OSI model
ATM work
35. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
LAN
Stateless packet filter
Rootkit
The Information Centric defense in depth
36. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Some network design objectives
MAN
Some reasons to use TCP over UDP
The physical layer stack
37. Message in its encrypted form
PAN
UDP packet headers
The five threat vectors
Ciphertext
38. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Some common TCP ports
Permutation
Stateful firewall
LAN
39. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Race conditions
Deep packet inspection
Snort
NIDS challenges
40. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
TFTP
NIDS advantages
Internet
A netcat listener
41. Simple attack done by simply browsing available information that's allowed on a local network.
Port scan
WAN
Some reasons to use UDP over TCP
Browsing attack
42. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
HIDS monitor
SQL Slammer Worm
Proxy or application gateway
UDP packet headers
43. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Remote maintenance
Anomaly analysis work
Rootkit
Proxy or application gateway
44. True positive - false positive - true negative - false negative
Wardriving
The four types of events reported by IDS
IDS not
Address resolution protocol
45. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Firewall
Defense in depth
Proxy or application gateway
Bridge
46. logic bomb - trojan horse - trap door
Ciphertext
Multi protocol label switching
The goals of cryptography
Some types of malicious code
47. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Worms
When implementing protocols - what stack should be used?
Some types of malicious code
Switches
48. Considered to be a perimeter device
Network stumbler
Router
Denial of service
HIDS monitor
49. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
What range is a class B network?
Proxy or application gateway
Some external threat concerns
No State Inspection ACK flag set
50. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Honeypot
COM/Script program infector
Deep packet inspection
Some NIDS topology limitations