SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Types of ATM virtual circuits
Address Resolution Protocol (ARP)
The OSI Protocol Stack
OS Command Injection defenses
2. One is for talking - one is for implementing
The difference in stacks
Nmap
The OSI model
Arbitrary substitution
3. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Integrity of Data
The OSI Protocol Stack
Overview of TCP
Rotation?
4. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
LAN
Total cell size for asynchronous transfer mode (ATM)
A netcat listener
The network layer
5. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
What range is a class A network?
The goals of cryptography
TFTP
What range is a class B network?
6. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
Best way to protect wireless networks
PAN
Bridge
A netcat listener
7. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
Types of ATM virtual circuits
Some network design objectives
MAN
8. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Snort
Stateful firewall
Some firewall challenges
The Information Centric defense in depth
9. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
CIDR
Permutation
Macro virus
The OSI model
10. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
NIDS advantages
The Information Centric defense in depth
Best way to protect wireless networks
11. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bridge
What ways should the crypto key be protected?
ATM work
Rootkit
12. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Boot record infector
Some reasons to use UDP over TCP
PAN
Group
13. Known - unknown - zero day
Port scan
What categories do vulnerabilities fall into?
Vulnerabilities
Some common UDP ports
14. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Some NIDS topology limitations
Remote maintenance
COM/Script program infector
Nmap
15. The Practice of sending an ACK inside another packet going to the same destination
Vulnerabilities
Bus Topology
Ack Piggybacking
DDoS attack
16. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Honeyd
What range is a class C network?
When implementing protocols - what stack should be used?
Some malware capabilities
17. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
The OSI Protocol Stack
IDS not
NAC
Risk
18. Unified data carrying service - replacing from replay and ATM
Multi protocol label switching
Denial of service
Some FTP dangers
Shallow packet inspection
19. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Some reasons to use TCP over UDP
When setting up a virtual circuit
Some firewall challenges
Honeypot
20. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
COM/Script program infector
Best way to protect wireless networks
The threat vector analysis in defense in depth
Some common UDP ports
21. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
HIDS monitor
Alteration of code
IDS data normalization
Ciphertext
22. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Best way to protect wireless networks
Hping
The protected enclave to defense in depth
EXE program infector
23. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Port scan
The OSI Protocol Stack
The four basic approaches to defense in depth
Some common TCP ports
24. OSI
The four basic approaches to defense in depth
When talking about protocols and referencing layers - what stack is used
Plaintext
Some reasons to use UDP over TCP
25. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Log monitoring work?
PAN
Ciphertext
Some NIDS topology limitations
26. Syn - Syn/Ack - Ack
Some disadvantages of honeypots
The OSI Protocol Stack
To establish a TCP session
The physical layer stack
27. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Hping
Wardriving
No State Inspection ACK flag set
Arbitrary substitution
28. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
The OSI model
HIDS monitor
NIDS advantages
Best way to protect wireless networks
29. True positive - false positive - true negative - false negative
File Integrity checking work
Some malware capabilities
When implementing protocols - what stack should be used?
The four types of events reported by IDS
30. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
SQL Slammer Worm
Honeypot
Types of viruses
SYN flood
31. It makes sure the data sent from one side to the other is in a format useful to the other side
The TCP/IP model
To establish a TCP session
The presentation layer
SYN flood
32. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
When talking about protocols and referencing layers - what stack is used
File Integrity checking work
The five threat vectors
Stateful firewall
33. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
No State Inspection ACK flag set
Hubs
Types of viruses
Honeypot
34. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Kismet
The network layer
The Information Centric defense in depth
The physical layer stack
35. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
Asynchronous Transfer Mode
Firewall
The four basic approaches to defense in depth
The conficker worm
36. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Some external threat concerns
Some common TCP ports
SYN flood
When setting up a virtual circuit
37. Bits of code embedded in programs to quickly gain access at a later time
Types of ATM virtual circuits
Snort
Trap door
Integrity of Data
38. Provides insight into the tactics - motives - and attacker tools
Remote maintenance
Denial of service
What ways should the crypto key be protected?
Some honeypot advantages
39. destruction of data - leaking confidential information - providing backdoor access
Some malware capabilities
Alteration of code
IDS
Router
40. Network scanner.
Nmap
Port scan
WAN
Bridge
41. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
NIDS advantages
COM/Script program infector
Address resolution protocol
Some network design objectives
42. FIN 130 - ACK 131 - FIN 570 - ACK 571
To close a TCP session
What primary threats should be protected against
The OSI model
LAN
43. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
When implementing protocols - what stack should be used?
IDS data normalization
LAN
Some FTP dangers
44. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Proxy or application gateway
Log monitoring work?
Some reasons to use TCP over UDP
Some firewall challenges
45. Attaches itself to existing program files and activated when the exe is launched
NIDS challenges
A network protocol
Program infector
Some types of malicious code
46. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Datagram length of a UDP packet
What's an easy way to test encryption?
Proxy or application gateway
Vulnerabilities
47. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Types of ATM virtual circuits
Arbitrary substitution
Some malware propagation techniques
Bridge
48. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
When implementing protocols - what stack should be used?
The CIA triad
WAN
Permutation
49. Considered to be a perimeter device
Datagram length of a UDP packet
Router
The session layer
Some other UDP based protocols
50. Confidentiality - integrity - availability
NIDS advantages
Honeyd
Deep packet inspection
The CIA triad
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests