SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
SYN flood
Risk
The different cable categories
Race conditions
2. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
The threat vector analysis in defense in depth
Checksum in UDP
WAN
Some reasons to use UDP over TCP
3. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
CIDR
What ways should the crypto key be protected?
Vulnerabilities
Trojan horse
4. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
Some network design objectives
The conficker worm
Social engineering
What's an easy way to test encryption?
5. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
The physical layer stack
Arbitrary substitution
The goals of cryptography
Some disadvantages of honeypots
6. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
The protected enclave to defense in depth
Denial of service
Hping
Stateful firewall
8. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
IDS data normalization
ACK piggybacking
Firewall
Smurf attack
9. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Multi protocol label switching
Address Resolution Protocol (ARP)
3-way handshake
Honeypot
10. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
SYN flood
Some honeypot advantages
To establish a TCP session
11. FIN 130 - ACK 131 - FIN 570 - ACK 571
UDP packet headers
Some other UDP based protocols
Remote maintenance
To close a TCP session
12. One is for talking - one is for implementing
The difference in stacks
The threat vector analysis in defense in depth
TFTP
Wardriving
13. Full open - half open (stealth scan) - UDP - Ping
What's an easy way to test encryption?
The TCP/IP model
Nmap scanning techniques
Checksum in UDP
14. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
File integrity checking work
Kismet
Log monitoring work?
The OSI Protocol Stack
15. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
WAN
When setting up a virtual circuit
Some network design objectives
Race conditions
16. Attaches itself to existing program files and activated when the exe is launched
Program infector
Permutation
HIDS monitor
SQL Slammer Worm
17. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
What range is a class A network?
To close a TCP session
the application layer
The threat vector analysis in defense in depth
18. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
No State Inspection ACK flag set
Types of viruses
NIDS challenges
Social engineering
19. Relies on executable code insertion and user interaction to spread
Parasitic malware
What threats should be protected against - based on threat levels
Stateless packet filter
The physical layer stack
20. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The four basic approaches to defense in depth
The TCP/IP model
Worms
Rootkit
21. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
HIDS monitor
A blind FTP
Smurf attack
File integrity checking work
22. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Worms
Hping
Honeyd
Asynchronous Transfer Mode
23. Protected at rest - protected in transit - secure the key
Types of ATM virtual circuits
What ways should the crypto key be protected?
MAN
Internet
24. Confidentiality - integrity - availability
Macro virus
The CIA triad
Log monitoring work?
Some firewall benefits
25. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Asynchronous Transfer Mode
Types of viruses
CIDR
Hping
26. It handles the establishment and maintenance of connections between systems
NAC
To close a TCP session
The session layer
Integrity of Data
27. The practice of sending an ACK inside another packet going to the same destination
ACK piggybacking
the application layer
Router
What's a VLAN
28. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
The physical layer stack
Alteration of code
PAN
The network layer
29. Handles transmissions across the physical media like wires - fiber - etc
The physical layer stack
Some common TCP ports
Plaintext
LAN
30. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
The network layer
Port scan
Honeypot
Some network design objectives
31. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Some reasons to use UDP over TCP
The CIA triad
Logic bomb
Nmap
32. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
What range is a class A network?
Internet
What threats should be protected against - based on threat levels
HIDS monitor
33. Connects many WANs - MANs - and LANs - provided via ISP
Stateful firewall
The Information Centric defense in depth
Internet
Browsing attack
34. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The transport layer
WAN
What range is a class B network?
Internet
35. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
A blind FTP
Vulnerabilities
The different cable categories
Some NIDS topology limitations
36. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
Rootkit
Rotation?
IDS data normalization
ATM work
37. It makes sure the data sent from one side to the other is in a format useful to the other side
A netcat listener
The presentation layer
A network protocol
Rotation?
38. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The four types of events reported by IDS
The different cable categories
Stateful firewall
Remote maintenance
39. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
Multi protocol label switching
ACK piggybacking
EXE program infector
Some types of malicious code
40. Confidentiality - integrity - availability
The three goals of security
Port scan
Denial of service
EXE program infector
41. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Macro virus
The protected enclave to defense in depth
IDS signature analysis work
Address resolution protocol
42. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
Some external threat concerns
IDS data normalization
Overview of TCP
Address Resolution Protocol (ARP)
43. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
Boot record infector
Address resolution protocol
Logic bomb
Remote maintenance
44. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
What's an easy way to test encryption?
Some other UDP based protocols
Deep packet inspection
The OSI Protocol Stack
45. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
IDS signature analysis work
Address resolution protocol
SQL Slammer Worm
What range is a class C network?
46. The Practice of sending an ACK inside another packet going to the same destination
The session layer
Firewall
The difference in stacks
Ack Piggybacking
47. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Asynchronous Transfer Mode
Types of ATM virtual circuits
Bridge
UDP packet headers
48. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
The network layer
Some malware capabilities
Deep packet inspection
Anomaly analysis work
49. Network scanner.
Rotation?
Multi protocol label switching
Nmap
To close a TCP session
50. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bridge
Router
Anomaly analysis work
The threat vector analysis in defense in depth