SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS data normalization
UDP packet headers
Social engineering
Ack Piggybacking
2. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
Some malware propagation techniques
The five threat vectors
HIDS monitor
The TCP/IP model
3. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Honeypot
Some NIDS topology limitations
The presentation layer
the application layer
4. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Trap door
Snort
The CIA triad
Bus Topology
5. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Nmap
Switches
Group
NAC
6. OSI
The OSI model
Logic bomb
Honeyd
When talking about protocols and referencing layers - what stack is used
7. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Boot record infector
Some other UDP based protocols
Checksum in UDP
LAN
8. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
What range is a class B network?
Stateful firewall
Rotation?
Trap door
9. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
IDS not
Hping
Honeypot
Checksum in UDP
10. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Honeypot
Internet
A netcat listener
11. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Port scan
Macro virus
Some reasons to use UDP over TCP
WAN
12. Relies on executable code insertion and user interaction to spread
Datagram length of a UDP packet
Some reasons to use TCP over UDP
Trap door
Parasitic malware
13. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Some disadvantages of honeypots
What range is a class C network?
UDP packet headers
A blind FTP
14. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The five threat vectors
The transport layer
CIDR
Firewall
16. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Some external threat concerns
The four types of events reported by IDS
A netmask
Some types of malicious code
17. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
A netmask
Some Pen Test techniques
Proxy or application gateway
Some FTP dangers
18. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
ATM work
Some honeypot advantages
Logic bomb
OS Command Injection defenses
19. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
When talking about protocols and referencing layers - what stack is used
Arbitrary substitution
The TCP/IP model
DDoS attack
20. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
A blind FTP
Stateless packet filter
Social engineering
Integrity of Data
21. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
Anomaly analysis work
Proxy or application gateway
ACK piggybacking
22. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
War Dialing
Denial of service
The data link layer
The network layer
23. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Some common TCP ports
ACK piggybacking
Port scan
Brute force
24. It interacts with the application layer to determine which network services will be required
Address resolution protocol
The network layer
What's an easy way to test encryption?
the application layer
25. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
COM/Script program infector
Shallow packet inspection
The transport layer
NIDS challenges
26. Malware - insider threat - natural disaster - terrorism - pandemic
War Dialing
The transport layer
A netmask
What primary threats should be protected against
27. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
NIDS challenges
Social engineering
The CIA triad
Worms
28. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Trojan horse
Log monitoring work?
Vulnerabilities
Risk
29. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
CIDR
Router
Group
File Integrity checking work
30. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Types of ATM virtual circuits
PAN
When setting up a virtual circuit
3-way handshake
31. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Boot record infector
Integrity of Data
ACK piggybacking
Types of viruses
32. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
Some firewall challenges
Some other UDP based protocols
A blind FTP
No State Inspection ACK flag set
33. Network scanner.
Switches
Nmap
The five threat vectors
Logic bomb
34. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
WAN
Internet
SQL Slammer Worm
Total cell size for asynchronous transfer mode (ATM)
35. It makes sure the data sent from one side to the other is in a format useful to the other side
Anomaly analysis work
The presentation layer
Ack Piggybacking
Honeypot
36. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Wardriving
Checksum in UDP
A network protocol
ATM work
37. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Parasitic malware
3-way handshake
Stateful firewall
What range is a class B network?
38. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Types of viruses
Trap door
DDoS attack
Trojan horse
39. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Best way to protect wireless networks
Network stumbler
The five threat vectors
OS Command Injection defenses
40. Unencrypted message in its original form
Total cell size for asynchronous transfer mode (ATM)
The OSI Protocol Stack
Plaintext
Nmap
41. The Practice of sending an ACK inside another packet going to the same destination
3-way handshake
Program infector
Ack Piggybacking
Some firewall challenges
42. Personal area network - phone tethering - bluetooth - etc
The CIA triad
Some reasons to use UDP over TCP
PAN
The goals of cryptography
43. Confidentiality - symmetric encryption
Snort
The goals of cryptography
The session layer
3-way handshake
44. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
DDoS attack
Bridge
When implementing protocols - what stack should be used?
Macro virus
45. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Stateless packet filter
Nmap
NIDS advantages
The network layer
46. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Wardriving
Asynchronous Transfer Mode
Bridge
EXE program infector
47. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Some FTP dangers
Program infector
What range is a class C network?
The network layer
48. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
The Uniform Protection to defense in depth
SQL Slammer Worm
Trojan horse
Ack Piggybacking
49. Connects many WANs - MANs - and LANs - provided via ISP
The TCP/IP model
Rotation?
Internet
Some firewall benefits
50. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
The data link layer
Wardriving
The OSI Protocol Stack
Some ways to bypass firewall protections