SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Port scan
What range is a class A network?
Bridge
No State Inspection ACK flag set
2. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
The threat vector analysis in defense in depth
Proxy or application gateway
NIDS challenges
IDS signature analysis work
3. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Bus Topology
Denial of service
Some reasons to use TCP over UDP
Social engineering
4. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
What primary threats should be protected against
The network layer
IDS signature analysis work
Parasitic malware
5. Uniform protection - protected enclaves - information centric - threat vector analysis
A blind FTP
A netmask
The four basic approaches to defense in depth
Some reasons to use UDP over TCP
6. Protected at rest - protected in transit - secure the key
What ways should the crypto key be protected?
The CIA triad
Address Resolution Protocol (ARP)
What threats should be protected against - based on threat levels
7. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Some firewall challenges
Ciphertext
Arbitrary substitution
Race conditions
8. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Race conditions
Ack Piggybacking
Alteration of code
IDS not
9. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
When talking about protocols and referencing layers - what stack is used
Switches
DDoS attack
Social engineering
10. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
HIDS monitor
The presentation layer
Rootkit
Bridge
11. Relies on executable code insertion and user interaction to spread
The CIA triad
Parasitic malware
Types of ATM virtual circuits
Some firewall benefits
12. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
What primary threats should be protected against
Wardriving
Some firewall benefits
Worms
13. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Nmap scanning techniques
Switches
Some reasons to use UDP over TCP
CIDR
14. Intellectual property - business goals - validated data - historical
IDS
What threats should be protected against - based on threat levels
Log monitoring work?
Permutation
15. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
The Information Centric defense in depth
The different cable categories
The five threat vectors
Some types of malicious code
16. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Ack Piggybacking
Macro virus
When setting up a virtual circuit
The protected enclave to defense in depth
17. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
Wardriving
Proxy or application gateway
Some common UDP ports
HIDS monitor
18. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
The three goals of security
Deep packet inspection
Some ways to bypass firewall protections
Some reasons to use UDP over TCP
19. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Trap door
IDS not
Race conditions
Best way to protect wireless networks
20. Malware - insider threat - natural disaster - terrorism - pandemic
Log monitoring work?
The four types of events reported by IDS
What primary threats should be protected against
Logic bomb
21. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. Unified data carrying service - replacing from replay and ATM
Buffer overflow
Some external threat concerns
Multi protocol label switching
The goals of cryptography
23. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
Some malware capabilities
PAN
No State Inspection ACK flag set
ACK piggybacking
24. 53 bytes - 48 bytes for data - 5 bytes for the header
Total cell size for asynchronous transfer mode (ATM)
Stateful firewall
The Information Centric defense in depth
What ways should the crypto key be protected?
25. destruction of data - leaking confidential information - providing backdoor access
Trap door
Some malware capabilities
File Integrity checking work
the application layer
26. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
No State Inspection ACK flag set
PAN
The data link layer
Wardriving
27. It handles the establishment and maintenance of connections between systems
Remote maintenance
Address resolution protocol
IDS data normalization
The session layer
28. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
File integrity checking work
Bus Topology
Vulnerabilities
Integrity of Data
29. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
The difference in stacks
What primary threats should be protected against
WAN
Some types of malicious code
30. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Some disadvantages of honeypots
Router
What range is a class B network?
TFTP
31. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Hubs
Router
Boot record infector
Bus Topology
32. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
The goals of cryptography
ACK piggybacking
Some reasons to use TCP over UDP
A netcat listener
33. Unencrypted message in its original form
File integrity checking work
Some network design objectives
The physical layer stack
Plaintext
34. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
Address Resolution Protocol (ARP)
Ciphertext
Deep packet inspection
EXE program infector
35. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
The physical layer stack
What range is a class C network?
Some ways to bypass firewall protections
Stateless packet filter
36. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some common TCP ports
Stateless packet filter
No State Inspection ACK flag set
Some NIDS topology limitations
37. Connects many WANs - MANs - and LANs - provided via ISP
OS Command Injection defenses
Internet
File integrity checking work
Port scan
38. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Permutation
What ways should the crypto key be protected?
Stateful firewall
Address resolution protocol
39. Provides insight into the tactics - motives - and attacker tools
What categories do vulnerabilities fall into?
NIDS challenges
Stateless packet filter
Some honeypot advantages
40. Known - unknown - zero day
LAN
Honeypot
What categories do vulnerabilities fall into?
Kismet
41. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
Hubs
The transport layer
SQL Slammer Worm
The four basic approaches to defense in depth
42. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
What's a VLAN
Remote maintenance
Best way to protect wireless networks
Overview of TCP
43. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The transport layer
Trojan horse
Some common TCP ports
Remote maintenance
44. Stateful firewalls maintain state of traffic flows
The session layer
NAC
A network protocol
Stateful firewall
45. Confidentiality - integrity - availability
Worms
The protected enclave to defense in depth
The three goals of security
Integrity of Data
46. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
Some types of malicious code
Anomaly analysis work
When setting up a virtual circuit
Bridge
47. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
What range is a class B network?
Snort
A blind FTP
Logic bomb
48. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Integrity of Data
The TCP/IP model
Log monitoring work?
TFTP
49. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The TCP/IP model
Overview of TCP
Wardriving
LAN
50. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
To close a TCP session
ACK piggybacking
UDP packet headers
Integrity of Data
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests