SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A cracking tool inserted into the OS that allows the attacker to do as they please.
Integrity of Data
Some malware capabilities
Rootkit
What range is a class A network?
2. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Checksum in UDP
The OSI Protocol Stack
Switches
Alteration of code
3. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Honeyd
Rotation?
The OSI model
The transport layer
4. 53 bytes - 48 bytes for data - 5 bytes for the header
The five threat vectors
Some malware capabilities
IDS
Total cell size for asynchronous transfer mode (ATM)
5. logic bomb - trojan horse - trap door
Some types of malicious code
Rotation?
Some external threat concerns
Honeypot
6. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Proxy or application gateway
The TCP/IP model
The presentation layer
Some malware propagation techniques
7. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Router
PAN
MAN
Bus Topology
8. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Port scan
Nmap scanning techniques
Some NIDS topology limitations
IDS
9. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
IDS signature analysis work
Proxy or application gateway
Address Resolution Protocol (ARP)
COM/Script program infector
10. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
The transport layer
Some firewall benefits
Rotation?
PAN
11. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
When setting up a virtual circuit
Some reasons to use TCP over UDP
Honeyd
File integrity checking work
12. Connects many WANs - MANs - and LANs - provided via ISP
UDP packet headers
Arbitrary substitution
Internet
A network protocol
13. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
What threats should be protected against - based on threat levels
When implementing protocols - what stack should be used?
Plaintext
Browsing attack
14. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
The Uniform Protection to defense in depth
Bridge
Social engineering
Switches
15. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Alteration of code
Denial of service
Best way to protect wireless networks
SQL Slammer Worm
16. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
IDS not
Address resolution protocol
Switches
The CIA triad
17. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Ciphertext
The threat vector analysis in defense in depth
Some FTP dangers
HIDS monitor
18. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Stateful firewall
Bridge
Nmap
3-way handshake
19. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Smurf attack
The four types of events reported by IDS
Proxy or application gateway
Race conditions
20. Intellectual property - business goals - validated data - historical
Some external threat concerns
What threats should be protected against - based on threat levels
The CIA triad
File Integrity checking work
21. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Remote maintenance
Address Resolution Protocol (ARP)
The OSI Protocol Stack
IDS
22. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Snort
What primary threats should be protected against
Honeyd
To close a TCP session
23. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Proxy or application gateway
Bus Topology
When setting up a virtual circuit
Some network design objectives
24. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Permutation
SYN flood
NAC
MAN
25. Personal area network - phone tethering - bluetooth - etc
Ciphertext
The TCP/IP model
The Uniform Protection to defense in depth
PAN
26. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Anomaly analysis work
NIDS challenges
The four types of events reported by IDS
MAN
27. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
Stateful firewall
LAN
What range is a class B network?
28. Provides insight into the tactics - motives - and attacker tools
A netmask
Macro virus
The TCP/IP model
Some honeypot advantages
29. Simple attack done by simply browsing available information that's allowed on a local network.
The CIA triad
The threat vector analysis in defense in depth
Some reasons to use UDP over TCP
Browsing attack
30. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Honeypot
What range is a class A network?
Proxy or application gateway
Plaintext
31. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
The presentation layer
Macro virus
Alteration of code
WAN
32. Attaches itself to existing program files and activated when the exe is launched
Program infector
The goals of cryptography
Honeypot
Address Resolution Protocol (ARP)
33. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
A network protocol
Some common UDP ports
WAN
SYN flood
34. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
No State Inspection ACK flag set
Ack Piggybacking
SQL Slammer Worm
What range is a class A network?
35. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Vulnerabilities
Router
Some firewall challenges
WAN
36. Bits of code embedded in programs to quickly gain access at a later time
Trap door
IDS signature analysis work
Honeypot
Some disadvantages of honeypots
37. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
The Uniform Protection to defense in depth
What's a VLAN
The threat vector analysis in defense in depth
File integrity checking work
38. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
What range is a class B network?
Checksum in UDP
HIDS monitor
Shallow packet inspection
39. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
The four types of events reported by IDS
The conficker worm
What range is a class B network?
Some types of malicious code
40. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Ack Piggybacking
Remote maintenance
The presentation layer
Integrity of Data
41. fast - with little fidelity - examines header information and limited payload data
Rotation?
Logic bomb
Best way to protect wireless networks
Shallow packet inspection
42. An attempt to gain access by bombarding it with guesses until the password is found.
Proxy or application gateway
Brute force
The threat vector analysis in defense in depth
Honeypot
43. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Bridge
The protected enclave to defense in depth
Boot record infector
Switches
44. Known - unknown - zero day
What categories do vulnerabilities fall into?
Hping
What range is a class C network?
IDS
45. Intrusion detection system - it reports attacks against monitored systems/networks
IDS
Worms
Checksum in UDP
The Uniform Protection to defense in depth
46. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Stateless packet filter
Defense in depth
The threat vector analysis in defense in depth
UDP packet headers
47. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
What's an easy way to test encryption?
The five threat vectors
COM/Script program infector
Ack Piggybacking
48. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
CIDR
A blind FTP
The TCP/IP model
What ways should the crypto key be protected?
49. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Logic bomb
TFTP
Kismet
50. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
COM/Script program infector
Asynchronous Transfer Mode
Smurf attack
Defense in depth
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests