SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some reasons to use UDP over TCP
Integrity of Data
The Uniform Protection to defense in depth
Some NIDS topology limitations
2. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
HIDS monitor
Remote maintenance
Some reasons to use TCP over UDP
NIDS challenges
3. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
DDoS attack
Some disadvantages of honeypots
The OSI Protocol Stack
Worms
4. The Practice of sending an ACK inside another packet going to the same destination
The network layer
Program infector
Ack Piggybacking
The TCP/IP model
5. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
Port scan
TFTP
Race conditions
When setting up a virtual circuit
6. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
The goals of cryptography
What threats should be protected against - based on threat levels
Vulnerabilities
Snort
7. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The transport layer
No State Inspection ACK flag set
Defense in depth
Kismet
8. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Types of ATM virtual circuits
LAN
Types of viruses
ACK piggybacking
9. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Parasitic malware
ACK piggybacking
Some common TCP ports
The threat vector analysis in defense in depth
10. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Vulnerabilities
The Information Centric defense in depth
WAN
The OSI model
11. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Some external threat concerns
File integrity checking work
Alteration of code
Honeyd
12. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
The data link layer
Ack Piggybacking
Defense in depth
Nmap
13. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
The five threat vectors
EXE program infector
OS Command Injection defenses
Total cell size for asynchronous transfer mode (ATM)
14. Provides insight into the tactics - motives - and attacker tools
Some malware propagation techniques
What categories do vulnerabilities fall into?
NIDS advantages
Some honeypot advantages
15. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
The network layer
Smurf attack
Some malware propagation techniques
When talking about protocols and referencing layers - what stack is used
16. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
To close a TCP session
Address resolution protocol
MAN
Parasitic malware
17. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Anomaly analysis work
Deep packet inspection
Honeypot
Log monitoring work?
18. True positive - false positive - true negative - false negative
Some FTP dangers
Parasitic malware
The four types of events reported by IDS
The transport layer
19. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Some reasons to use TCP over UDP
Stateful firewall
Honeypot
Some reasons to use UDP over TCP
20. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
The Uniform Protection to defense in depth
Checksum in UDP
Some common UDP ports
The conficker worm
21. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Proxy or application gateway
Anomaly analysis work
Snort
What primary threats should be protected against
22. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Hping
OS Command Injection defenses
Social engineering
Some ways to bypass firewall protections
23. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
War Dialing
What range is a class A network?
When setting up a virtual circuit
NIDS advantages
24. Personal area network - phone tethering - bluetooth - etc
PAN
Snort
Some NIDS topology limitations
Ciphertext
25. Protected at rest - protected in transit - secure the key
The CIA triad
What ways should the crypto key be protected?
WAN
Integrity of Data
26. It interacts with the application layer to determine which network services will be required
the application layer
Remote maintenance
SQL Slammer Worm
Checksum in UDP
27. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
Proxy or application gateway
CIDR
Anomaly analysis work
LAN
28. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Network stumbler
Address resolution protocol
What ways should the crypto key be protected?
Remote maintenance
29. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some firewall challenges
Deep packet inspection
Alteration of code
MAN
30. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
TFTP
What categories do vulnerabilities fall into?
Integrity of Data
Nmap scanning techniques
31. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
The OSI model
Permutation
NIDS advantages
When setting up a virtual circuit
32. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Honeyd
OS Command Injection defenses
Proxy or application gateway
3-way handshake
33. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Total cell size for asynchronous transfer mode (ATM)
Permutation
Denial of service
Honeyd
34. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Rootkit
Firewall
ATM work
The conficker worm
35. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Best way to protect wireless networks
Remote maintenance
Hping
Honeyd
36. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
Some malware capabilities
The network layer
To establish a TCP session
Some firewall challenges
38. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Some network design objectives
Some honeypot advantages
Types of viruses
Arbitrary substitution
39. Intrusion detection system - it reports attacks against monitored systems/networks
IDS
Social engineering
IDS data normalization
Overview of TCP
40. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
The CIA triad
Some disadvantages of honeypots
To establish a TCP session
Nmap
41. Malware - insider threat - natural disaster - terrorism - pandemic
Stateless packet filter
What primary threats should be protected against
The Information Centric defense in depth
Permutation
42. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
The session layer
Overview of TCP
LAN
WAN
43. Stateful firewalls maintain state of traffic flows
File Integrity checking work
To close a TCP session
Multi protocol label switching
Stateful firewall
44. Confidentiality - symmetric encryption
COM/Script program infector
Boot record infector
The goals of cryptography
LAN
45. OSI
When implementing protocols - what stack should be used?
Some Pen Test techniques
When talking about protocols and referencing layers - what stack is used
Honeyd
46. Intellectual property - business goals - validated data - historical
The physical layer stack
What threats should be protected against - based on threat levels
ATM work
Kismet
47. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Group
Some ways to bypass firewall protections
Defense in depth
NIDS challenges
48. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Trap door
SYN flood
Address Resolution Protocol (ARP)
UDP packet headers
49. Confidentiality - integrity - availability
The physical layer stack
War Dialing
What range is a class C network?
The three goals of security
50. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Deep packet inspection
To establish a TCP session
Anomaly analysis work
File integrity checking work