SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
EXE program infector
To establish a TCP session
Datagram length of a UDP packet
File Integrity checking work
3. A cracking tool inserted into the OS that allows the attacker to do as they please.
NIDS advantages
File integrity checking work
CIDR
Rootkit
4. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Some reasons to use TCP over UDP
Some network design objectives
The session layer
Network stumbler
5. Known - unknown - zero day
SQL Slammer Worm
Log monitoring work?
What categories do vulnerabilities fall into?
The physical layer stack
6. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some malware propagation techniques
The four basic approaches to defense in depth
Some NIDS topology limitations
Logic bomb
7. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
3-way handshake
When talking about protocols and referencing layers - what stack is used
Remote maintenance
The network layer
8. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
The three goals of security
Firewall
OS Command Injection defenses
Social engineering
9. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
COM/Script program infector
Browsing attack
ATM work
Log monitoring work?
10. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
File integrity checking work
Some firewall challenges
Some common TCP ports
Firewall
11. FIN 130 - ACK 131 - FIN 570 - ACK 571
LAN
To close a TCP session
Some types of malicious code
Some honeypot advantages
12. Trying to ID modems in a telephone exchange that may be susceptible to compromise
The Uniform Protection to defense in depth
War Dialing
Remote maintenance
The conficker worm
13. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
IDS
Nmap
Address Resolution Protocol (ARP)
Snort
14. Syn - Syn/Ack - Ack
Integrity of Data
Switches
To establish a TCP session
A blind FTP
15. Message in its encrypted form
Ciphertext
NIDS challenges
The Information Centric defense in depth
A network protocol
16. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Arbitrary substitution
Logic bomb
Remote maintenance
Rotation?
17. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
File Integrity checking work
Denial of service
Worms
The goals of cryptography
18. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. The Practice of sending an ACK inside another packet going to the same destination
Deep packet inspection
Stateless packet filter
Ack Piggybacking
Some honeypot advantages
20. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
MAN
OS Command Injection defenses
SYN flood
DDoS attack
21. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Proxy or application gateway
Some honeypot advantages
Race conditions
Bridge
22. One is for talking - one is for implementing
Checksum in UDP
The difference in stacks
Firewall
Alteration of code
23. Considered to be a perimeter device
The difference in stacks
Some other UDP based protocols
Router
Types of viruses
24. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
Some types of malicious code
A netcat listener
Trap door
File Integrity checking work
25. Protected at rest - protected in transit - secure the key
CIDR
Some reasons to use TCP over UDP
3-way handshake
What ways should the crypto key be protected?
26. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
Alteration of code
Stateless packet filter
Some types of malicious code
HIDS monitor
27. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
The Information Centric defense in depth
Social engineering
Buffer overflow
Logic bomb
28. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Anomaly analysis work
Some common TCP ports
Permutation
3-way handshake
29. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Proxy or application gateway
Firewall
Some reasons to use TCP over UDP
What range is a class A network?
30. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
The five threat vectors
Macro virus
Some common TCP ports
The four types of events reported by IDS
31. Unencrypted message in its original form
Plaintext
What range is a class C network?
What ways should the crypto key be protected?
When setting up a virtual circuit
32. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
What range is a class A network?
Social engineering
What primary threats should be protected against
The data link layer
33. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
IDS data normalization
The OSI model
Types of ATM virtual circuits
No State Inspection ACK flag set
34. Connects many WANs - MANs - and LANs - provided via ISP
Some common TCP ports
Internet
DDoS attack
Some NIDS topology limitations
35. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Denial of service
3-way handshake
To establish a TCP session
Wardriving
36. logic bomb - trojan horse - trap door
Nmap
Macro virus
Vulnerabilities
Some types of malicious code
37. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Plaintext
Integrity of Data
The OSI model
Types of ATM virtual circuits
38. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
Port scan
PAN
Some malware propagation techniques
39. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Bus Topology
The OSI Protocol Stack
Some reasons to use UDP over TCP
IDS not
40. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
Types of viruses
Some external threat concerns
Trap door
41. OSI
When talking about protocols and referencing layers - what stack is used
Anomaly analysis work
The OSI Protocol Stack
Vulnerabilities
42. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
A network protocol
Rootkit
Some reasons to use UDP over TCP
When implementing protocols - what stack should be used?
43. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Program infector
Remote maintenance
IDS not
A blind FTP
44. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS data normalization
The protected enclave to defense in depth
IDS
Integrity of Data
45. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
The Uniform Protection to defense in depth
A netcat listener
Race conditions
Overview of TCP
46. Going around with equipment to detect wireless networks
Proxy or application gateway
IDS data normalization
Wardriving
Logic bomb
47. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Some common UDP ports
Some reasons to use UDP over TCP
Hping
Some ways to bypass firewall protections
48. The practice of sending an ACK inside another packet going to the same destination
IDS data normalization
Log monitoring work?
The four basic approaches to defense in depth
ACK piggybacking
49. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Social engineering
Stateful firewall
Proxy or application gateway
Logic bomb
50. Confidentiality - symmetric encryption
IDS
The goals of cryptography
The conficker worm
CIDR