SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
A netcat listener
The network layer
ATM work
NAC
2. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
PAN
Stateful firewall
Integrity of Data
The different cable categories
3. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Types of viruses
Types of ATM virtual circuits
Total cell size for asynchronous transfer mode (ATM)
Wardriving
4. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Anomaly analysis work
Arbitrary substitution
Overview of TCP
The threat vector analysis in defense in depth
5. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
Datagram length of a UDP packet
The TCP/IP model
Some firewall benefits
Ack Piggybacking
6. Confidentiality - symmetric encryption
No State Inspection ACK flag set
A netcat listener
What range is a class C network?
The goals of cryptography
7. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
A blind FTP
Some reasons to use TCP over UDP
The difference in stacks
Risk
8. Message in its encrypted form
Ciphertext
Total cell size for asynchronous transfer mode (ATM)
Social engineering
Smurf attack
9. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some NIDS topology limitations
Bridge
Some types of malicious code
Anomaly analysis work
10. Stateful firewalls maintain state of traffic flows
Some malware capabilities
IDS not
Stateful firewall
A netcat listener
11. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
A netcat listener
Overview of TCP
MAN
Stateless packet filter
12. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
IDS
Overview of TCP
Deep packet inspection
Some firewall benefits
13. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
File Integrity checking work
The protected enclave to defense in depth
The five threat vectors
Anomaly analysis work
14. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
When talking about protocols and referencing layers - what stack is used
Bridge
Some malware capabilities
Program infector
15. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
IDS signature analysis work
File integrity checking work
Social engineering
The OSI model
16. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Trap door
Some external threat concerns
Rotation?
Hubs
17. Unified data carrying service - replacing from replay and ATM
Brute force
Some reasons to use UDP over TCP
Multi protocol label switching
Social engineering
18. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
To close a TCP session
The threat vector analysis in defense in depth
the application layer
A network protocol
19. Going around with equipment to detect wireless networks
Wardriving
What threats should be protected against - based on threat levels
The goals of cryptography
IDS not
20. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
The presentation layer
DDoS attack
Smurf attack
Permutation
21. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
NAC
Datagram length of a UDP packet
Some reasons to use TCP over UDP
Switches
22. It interacts with the application layer to determine which network services will be required
3-way handshake
the application layer
Nmap
Types of viruses
23. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Ack Piggybacking
Vulnerabilities
Social engineering
Bus Topology
24. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
No State Inspection ACK flag set
Firewall
Some external threat concerns
To close a TCP session
25. Known - unknown - zero day
Some reasons to use UDP over TCP
What categories do vulnerabilities fall into?
Trojan horse
Port scan
26. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Deep packet inspection
Rotation?
Kismet
What primary threats should be protected against
27. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Total cell size for asynchronous transfer mode (ATM)
Network stumbler
WAN
A netmask
28. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
The conficker worm
Worms
When implementing protocols - what stack should be used?
NIDS challenges
29. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
The conficker worm
Types of ATM virtual circuits
Hping
Vulnerabilities
30. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
The network layer
Brute force
Denial of service
Some firewall challenges
31. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
No State Inspection ACK flag set
Denial of service
LAN
What categories do vulnerabilities fall into?
32. Considered to be a perimeter device
NIDS advantages
Router
The session layer
IDS not
33. One is for talking - one is for implementing
The difference in stacks
Hubs
Wardriving
3-way handshake
34. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
3-way handshake
Shallow packet inspection
Smurf attack
The three goals of security
35. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
The Information Centric defense in depth
File Integrity checking work
Some other UDP based protocols
To establish a TCP session
36. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
The threat vector analysis in defense in depth
What ways should the crypto key be protected?
The presentation layer
Hping
37. Trying to ID modems in a telephone exchange that may be susceptible to compromise
The OSI Protocol Stack
Rootkit
Boot record infector
War Dialing
38. fast - with little fidelity - examines header information and limited payload data
Parasitic malware
Denial of service
Some firewall challenges
Shallow packet inspection
39. logic bomb - trojan horse - trap door
Some types of malicious code
The OSI model
MAN
Port scan
40. Intrusion detection system - it reports attacks against monitored systems/networks
IDS
Some Pen Test techniques
HIDS monitor
the application layer
41. FIN 130 - ACK 131 - FIN 570 - ACK 571
To close a TCP session
To establish a TCP session
COM/Script program infector
The conficker worm
42. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Macro virus
Rotation?
What range is a class B network?
the application layer
43. Uniform protection - protected enclaves - information centric - threat vector analysis
IDS data normalization
Internet
Multi protocol label switching
The four basic approaches to defense in depth
44. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
A blind FTP
OS Command Injection defenses
Some malware propagation techniques
Honeypot
45. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
Rootkit
EXE program infector
The different cable categories
The OSI model
46. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Buffer overflow
Overview of TCP
MAN
Logic bomb
47. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Trojan horse
Snort
OS Command Injection defenses
Trap door
48. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Some NIDS topology limitations
Some common TCP ports
COM/Script program infector
Bridge
49. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Total cell size for asynchronous transfer mode (ATM)
The conficker worm
TFTP
Some malware propagation techniques
50. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Alteration of code
The OSI Protocol Stack
DDoS attack
Risk