SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
Honeypot
Asynchronous Transfer Mode
The difference in stacks
The TCP/IP model
2. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Bridge
Alteration of code
Network stumbler
Some reasons to use UDP over TCP
3. destruction of data - leaking confidential information - providing backdoor access
Some external threat concerns
Alteration of code
IDS
Some malware capabilities
4. Unified data carrying service - replacing from replay and ATM
Some types of malicious code
Multi protocol label switching
The four basic approaches to defense in depth
Some common UDP ports
5. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
UDP packet headers
Hubs
The four types of events reported by IDS
Worms
6. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Rotation?
Risk
Shallow packet inspection
What range is a class C network?
7. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Honeypot
Alteration of code
Some common UDP ports
The Information Centric defense in depth
8. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Overview of TCP
UDP packet headers
Alteration of code
Honeypot
9. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
EXE program infector
SQL Slammer Worm
NIDS advantages
The transport layer
10. Malware - insider threat - natural disaster - terrorism - pandemic
The threat vector analysis in defense in depth
What primary threats should be protected against
Logic bomb
The TCP/IP model
11. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The presentation layer
Some Pen Test techniques
Total cell size for asynchronous transfer mode (ATM)
Remote maintenance
12. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Social engineering
Some common TCP ports
Switches
Some reasons to use UDP over TCP
13. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
The Uniform Protection to defense in depth
Types of viruses
Stateless packet filter
The four types of events reported by IDS
14. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Kismet
Defense in depth
Some network design objectives
Parasitic malware
15. Full open - half open (stealth scan) - UDP - Ping
Network stumbler
Nmap scanning techniques
Firewall
Some common TCP ports
16. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Snort
Stateless packet filter
Asynchronous Transfer Mode
What range is a class C network?
17. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
The conficker worm
The five threat vectors
Buffer overflow
Worms
18. Syn - Syn/Ack - Ack
To establish a TCP session
ACK piggybacking
NAC
To close a TCP session
19. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
IDS not
To close a TCP session
the application layer
No State Inspection ACK flag set
20. Attaches itself to existing program files and activated when the exe is launched
Network stumbler
NIDS challenges
Plaintext
Program infector
21. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Kismet
The difference in stacks
IDS data normalization
The data link layer
22. Bits of code embedded in programs to quickly gain access at a later time
Trap door
ATM work
The three goals of security
The protected enclave to defense in depth
23. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
What categories do vulnerabilities fall into?
The different cable categories
Shallow packet inspection
24. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
What range is a class A network?
Honeyd
Asynchronous Transfer Mode
When implementing protocols - what stack should be used?
25. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
The protected enclave to defense in depth
Overview of TCP
CIDR
26. Infects MBR - no network spreading potential
Risk
Boot record infector
Race conditions
Buffer overflow
27. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Some external threat concerns
What range is a class A network?
NIDS advantages
What primary threats should be protected against
28. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
TFTP
NAC
NIDS challenges
Some types of malicious code
29. The practice of sending an ACK inside another packet going to the same destination
Shallow packet inspection
3-way handshake
The CIA triad
ACK piggybacking
30. FIN 130 - ACK 131 - FIN 570 - ACK 571
The presentation layer
To close a TCP session
Some firewall benefits
The transport layer
31. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
IDS data normalization
Hping
What range is a class A network?
Permutation
32. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
UDP packet headers
ATM work
Race conditions
Arbitrary substitution
33. Known - unknown - zero day
What categories do vulnerabilities fall into?
Some malware propagation techniques
ACK piggybacking
Vulnerabilities
34. Network scanner.
Nmap
Some malware propagation techniques
To establish a TCP session
The difference in stacks
35. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
3-way handshake
Plaintext
Nmap scanning techniques
Types of ATM virtual circuits
36. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Integrity of Data
The transport layer
Shallow packet inspection
The protected enclave to defense in depth
37. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
What range is a class B network?
Denial of service
LAN
Arbitrary substitution
38. Handles transmissions across the physical media like wires - fiber - etc
The physical layer stack
the application layer
Port scan
Some Pen Test techniques
39. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
File integrity checking work
Proxy or application gateway
What's an easy way to test encryption?
Switches
40. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
File Integrity checking work
NIDS advantages
Denial of service
The four basic approaches to defense in depth
41. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Some reasons to use TCP over UDP
The physical layer stack
Defense in depth
Ack Piggybacking
42. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Internet
Logic bomb
Rotation?
Permutation
43. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
IDS
Trap door
HIDS monitor
NAC
44. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
The three goals of security
What range is a class B network?
The OSI model
Social engineering
45. Relies on executable code insertion and user interaction to spread
Bridge
HIDS monitor
Parasitic malware
MAN
46. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Parasitic malware
Some disadvantages of honeypots
Firewall
Nmap
47. It handles the establishment and maintenance of connections between systems
ACK piggybacking
The network layer
The session layer
TFTP
48. Confidentiality - integrity - availability
Asynchronous Transfer Mode
Network stumbler
The CIA triad
IDS data normalization
49. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Port scan
3-way handshake
The CIA triad
Macro virus
50. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
The data link layer
UDP packet headers
Alteration of code
What's an easy way to test encryption?