SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Kismet
The TCP/IP model
Some ways to bypass firewall protections
Honeyd
2. Attaches itself to existing program files and activated when the exe is launched
Bridge
Brute force
What range is a class C network?
Program infector
3. fast - with little fidelity - examines header information and limited payload data
Hping
Shallow packet inspection
Some common UDP ports
Nmap scanning techniques
4. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Anomaly analysis work
Trap door
Browsing attack
Some firewall benefits
5. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
Plaintext
Router
Some reasons to use UDP over TCP
IDS signature analysis work
6. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
Stateless packet filter
Worms
The five threat vectors
Ciphertext
7. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
ACK piggybacking
The threat vector analysis in defense in depth
Internet
Asynchronous Transfer Mode
8. Confidentiality - integrity - availability
Permutation
The OSI Protocol Stack
The CIA triad
EXE program infector
9. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Some external threat concerns
What range is a class B network?
UDP packet headers
The transport layer
10. Uniform protection - protected enclaves - information centric - threat vector analysis
HIDS monitor
ACK piggybacking
Trap door
The four basic approaches to defense in depth
11. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Trap door
The data link layer
Some other UDP based protocols
Nmap scanning techniques
12. Relies on executable code insertion and user interaction to spread
IDS
Parasitic malware
Multi protocol label switching
OS Command Injection defenses
13. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Some Pen Test techniques
Rootkit
NIDS challenges
EXE program infector
14. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
A network protocol
Address Resolution Protocol (ARP)
The four types of events reported by IDS
Bridge
15. FIN 130 - ACK 131 - FIN 570 - ACK 571
Parasitic malware
A blind FTP
The Information Centric defense in depth
To close a TCP session
16. Stateful firewalls maintain state of traffic flows
Stateful firewall
SQL Slammer Worm
Remote maintenance
IDS signature analysis work
17. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
Vulnerabilities
HIDS monitor
Arbitrary substitution
COM/Script program infector
18. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Denial of service
HIDS monitor
Switches
IDS not
19. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Internet
Permutation
Address Resolution Protocol (ARP)
The different cable categories
20. Personal area network - phone tethering - bluetooth - etc
PAN
The network layer
To establish a TCP session
Arbitrary substitution
21. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Plaintext
Nmap scanning techniques
Some reasons to use TCP over UDP
MAN
22. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
What threats should be protected against - based on threat levels
Some other UDP based protocols
Router
WAN
23. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
The TCP/IP model
UDP packet headers
The different cable categories
The presentation layer
24. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Total cell size for asynchronous transfer mode (ATM)
Some NIDS topology limitations
A network protocol
The TCP/IP model
25. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
WAN
Vulnerabilities
Some ways to bypass firewall protections
Some external threat concerns
26. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Risk
Vulnerabilities
Some reasons to use UDP over TCP
Port scan
27. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Types of ATM virtual circuits
Network stumbler
Checksum in UDP
Some firewall benefits
28. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The CIA triad
The Information Centric defense in depth
The TCP/IP model
the application layer
29. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Hubs
Log monitoring work?
Risk
Arbitrary substitution
30. Connects many WANs - MANs - and LANs - provided via ISP
The OSI model
IDS signature analysis work
File integrity checking work
Internet
31. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Smurf attack
Some Pen Test techniques
Permutation
Some reasons to use TCP over UDP
32. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Ack Piggybacking
Trap door
The OSI Protocol Stack
EXE program infector
33. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Nmap scanning techniques
SYN flood
The protected enclave to defense in depth
Some malware propagation techniques
34. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Proxy or application gateway
Trap door
The OSI model
The four basic approaches to defense in depth
35. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
A network protocol
Snort
The transport layer
the application layer
36. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Some NIDS topology limitations
Remote maintenance
Stateful firewall
The network layer
37. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
DDoS attack
Deep packet inspection
A netmask
The OSI Protocol Stack
38. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
The Uniform Protection to defense in depth
Browsing attack
CIDR
No State Inspection ACK flag set
39. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
What range is a class C network?
Smurf attack
Types of viruses
The four types of events reported by IDS
40. It handles the establishment and maintenance of connections between systems
Ack Piggybacking
What's a VLAN
The session layer
Anomaly analysis work
41. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Alteration of code
The OSI model
Nmap
The session layer
42. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Worms
MAN
Firewall
The four basic approaches to defense in depth
43. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
The CIA triad
MAN
A blind FTP
Macro virus
44. Bits of code embedded in programs to quickly gain access at a later time
Trap door
Types of ATM virtual circuits
The CIA triad
The Uniform Protection to defense in depth
45. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
When talking about protocols and referencing layers - what stack is used
Honeypot
Types of ATM virtual circuits
Parasitic malware
46. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
The Information Centric defense in depth
Permutation
When setting up a virtual circuit
Some NIDS topology limitations
47. The practice of sending an ACK inside another packet going to the same destination
Social engineering
Some NIDS topology limitations
ACK piggybacking
TFTP
48. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
The difference in stacks
What's a VLAN
Some FTP dangers
A blind FTP
49. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
TFTP
Bridge
SQL Slammer Worm
Nmap
50. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Stateless packet filter
IDS signature analysis work
Some disadvantages of honeypots
Trojan horse