SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides insight into the tactics - motives - and attacker tools
Rootkit
When setting up a virtual circuit
Some honeypot advantages
A blind FTP
2. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
CIDR
Some common TCP ports
When talking about protocols and referencing layers - what stack is used
Types of ATM virtual circuits
3. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
OS Command Injection defenses
Stateless packet filter
Some disadvantages of honeypots
Honeyd
4. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Address Resolution Protocol (ARP)
Kismet
Honeypot
The physical layer stack
5. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Total cell size for asynchronous transfer mode (ATM)
ATM work
A netcat listener
Risk
6. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Multi protocol label switching
Stateless packet filter
The CIA triad
A network protocol
7. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some FTP dangers
Boot record infector
The OSI model
Some NIDS topology limitations
8. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
The presentation layer
TFTP
LAN
NIDS advantages
9. The practice of sending an ACK inside another packet going to the same destination
3-way handshake
Denial of service
A netcat listener
ACK piggybacking
10. Trying to ID modems in a telephone exchange that may be susceptible to compromise
Best way to protect wireless networks
Address Resolution Protocol (ARP)
What primary threats should be protected against
War Dialing
11. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Some types of malicious code
Some common TCP ports
PAN
Anomaly analysis work
12. It makes sure the data sent from one side to the other is in a format useful to the other side
Denial of service
When talking about protocols and referencing layers - what stack is used
The presentation layer
The CIA triad
13. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Overview of TCP
NIDS advantages
Some honeypot advantages
What range is a class B network?
14. Infects MBR - no network spreading potential
When setting up a virtual circuit
ACK piggybacking
Some FTP dangers
Boot record infector
15. Unencrypted message in its original form
Plaintext
Smurf attack
The physical layer stack
Datagram length of a UDP packet
16. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
ATM work
Parasitic malware
Ack Piggybacking
Permutation
17. Protected at rest - protected in transit - secure the key
No State Inspection ACK flag set
Router
Some firewall challenges
What ways should the crypto key be protected?
18. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Defense in depth
OS Command Injection defenses
What range is a class A network?
A netcat listener
19. Syn - Syn/Ack - Ack
To establish a TCP session
The conficker worm
A blind FTP
EXE program infector
20. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
A network protocol
Logic bomb
IDS data normalization
Internet
21. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
The OSI Protocol Stack
A blind FTP
Best way to protect wireless networks
Some external threat concerns
22. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
The difference in stacks
Smurf attack
The different cable categories
Risk
23. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
No State Inspection ACK flag set
SQL Slammer Worm
Anomaly analysis work
Datagram length of a UDP packet
24. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
ACK piggybacking
DDoS attack
The TCP/IP model
Some Pen Test techniques
25. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. It handles the establishment and maintenance of connections between systems
Some FTP dangers
The session layer
Plaintext
Best way to protect wireless networks
27. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Some malware capabilities
Types of viruses
Hubs
When setting up a virtual circuit
28. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The difference in stacks
Plaintext
Some external threat concerns
Remote maintenance
29. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
NAC
CIDR
Integrity of Data
Some other UDP based protocols
30. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
OS Command Injection defenses
The CIA triad
Some malware capabilities
What range is a class A network?
31. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Defense in depth
SQL Slammer Worm
The transport layer
Honeypot
32. Simple attack done by simply browsing available information that's allowed on a local network.
NAC
MAN
Router
Browsing attack
33. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Stateful firewall
The threat vector analysis in defense in depth
Integrity of Data
Network stumbler
34. An attempt to gain access by bombarding it with guesses until the password is found.
Bridge
Brute force
Snort
Parasitic malware
35. Bits of code embedded in programs to quickly gain access at a later time
Permutation
NIDS advantages
A netcat listener
Trap door
36. OSI
What primary threats should be protected against
A blind FTP
When setting up a virtual circuit
When talking about protocols and referencing layers - what stack is used
37. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
The Information Centric defense in depth
the application layer
MAN
No State Inspection ACK flag set
38. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Switches
Hping
NIDS challenges
COM/Script program infector
39. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Honeyd
Checksum in UDP
Firewall
3-way handshake
40. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Some firewall challenges
Best way to protect wireless networks
Datagram length of a UDP packet
Anomaly analysis work
41. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Proxy or application gateway
Race conditions
Address resolution protocol
Some NIDS topology limitations
42. Known - unknown - zero day
Some external threat concerns
Group
What categories do vulnerabilities fall into?
The physical layer stack
43. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
The conficker worm
Deep packet inspection
The five threat vectors
Group
44. Malware - insider threat - natural disaster - terrorism - pandemic
What's a VLAN
the application layer
What primary threats should be protected against
Remote maintenance
45. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
A blind FTP
Nmap scanning techniques
COM/Script program infector
What primary threats should be protected against
46. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Hubs
Some FTP dangers
Some external threat concerns
SYN flood
47. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
Some reasons to use UDP over TCP
Some common TCP ports
Some Pen Test techniques
Switches
48. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
COM/Script program infector
Ciphertext
Switches
Arbitrary substitution
49. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
CIDR
Internet
The OSI model
Plaintext
50. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Log monitoring work?
HIDS monitor
Internet
Race conditions