SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Hping
SQL Slammer Worm
Smurf attack
Some disadvantages of honeypots
2. fast - with little fidelity - examines header information and limited payload data
Buffer overflow
What threats should be protected against - based on threat levels
Shallow packet inspection
Browsing attack
3. Infects MBR - no network spreading potential
Boot record infector
The network layer
IDS
When setting up a virtual circuit
4. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
Hping
A blind FTP
Some malware propagation techniques
Some honeypot advantages
5. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
No State Inspection ACK flag set
The presentation layer
Honeypot
Some NIDS topology limitations
6. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Program infector
A netmask
Internet
The OSI model
7. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
The presentation layer
LAN
Best way to protect wireless networks
Remote maintenance
8. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
MAN
Vulnerabilities
Parasitic malware
What range is a class A network?
9. Protected at rest - protected in transit - secure the key
Some firewall challenges
Kismet
What ways should the crypto key be protected?
Some external threat concerns
10. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Boot record infector
NIDS advantages
Trojan horse
Some FTP dangers
11. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
War Dialing
IDS signature analysis work
ACK piggybacking
Address Resolution Protocol (ARP)
12. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Log monitoring work?
Plaintext
IDS not
The TCP/IP model
13. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
No State Inspection ACK flag set
Some ways to bypass firewall protections
UDP packet headers
Permutation
14. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some firewall challenges
The session layer
Risk
Remote maintenance
15. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
The Information Centric defense in depth
Permutation
WAN
Trojan horse
16. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
NIDS challenges
Some external threat concerns
Rootkit
A netmask
17. Going around with equipment to detect wireless networks
Wardriving
OS Command Injection defenses
What's an easy way to test encryption?
Some external threat concerns
18. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Some common TCP ports
Boot record infector
Remote maintenance
Some other UDP based protocols
19. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
The different cable categories
Some other UDP based protocols
Group
What range is a class B network?
20. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Macro virus
The conficker worm
The Information Centric defense in depth
Checksum in UDP
21. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
To establish a TCP session
Nmap
File integrity checking work
Integrity of Data
22. It interacts with the application layer to determine which network services will be required
The Information Centric defense in depth
the application layer
Browsing attack
Asynchronous Transfer Mode
23. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Deep packet inspection
The physical layer stack
The three goals of security
Honeypot
24. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
NIDS challenges
Some network design objectives
Deep packet inspection
Hubs
25. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
The Information Centric defense in depth
The network layer
HIDS monitor
Browsing attack
26. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Risk
To establish a TCP session
Rotation?
Asynchronous Transfer Mode
27. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Some disadvantages of honeypots
What range is a class A network?
Anomaly analysis work
Nmap scanning techniques
28. Confidentiality - integrity - availability
Honeypot
The CIA triad
Router
File integrity checking work
29. Bits of code embedded in programs to quickly gain access at a later time
Trap door
What's an easy way to test encryption?
Parasitic malware
WAN
30. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
File Integrity checking work
Types of viruses
Smurf attack
Deep packet inspection
31. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
SQL Slammer Worm
When talking about protocols and referencing layers - what stack is used
To close a TCP session
MAN
32. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
File integrity checking work
ACK piggybacking
the application layer
Buffer overflow
33. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some firewall benefits
Trojan horse
What range is a class A network?
A netmask
34. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Proxy or application gateway
The protected enclave to defense in depth
Some malware propagation techniques
Some firewall benefits
35. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Stateful firewall
Some reasons to use UDP over TCP
HIDS monitor
The transport layer
36. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Overview of TCP
Some FTP dangers
Snort
The three goals of security
37. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
3-way handshake
the application layer
Some malware propagation techniques
The data link layer
38. Attaches itself to existing program files and activated when the exe is launched
A netcat listener
Nmap
Program infector
Some disadvantages of honeypots
39. Confidentiality - symmetric encryption
DDoS attack
Honeyd
The goals of cryptography
Denial of service
40. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Shallow packet inspection
When setting up a virtual circuit
Bridge
Bus Topology
41. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
Address resolution protocol
Internet
Parasitic malware
Some malware capabilities
42. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Risk
ACK piggybacking
TFTP
DDoS attack
43. Handles transmissions across the physical media like wires - fiber - etc
Trojan horse
File Integrity checking work
What categories do vulnerabilities fall into?
The physical layer stack
44. An attempt to gain access by bombarding it with guesses until the password is found.
Brute force
What range is a class C network?
WAN
DDoS attack
45. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Rotation?
Trap door
Race conditions
The different cable categories
46. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
SQL Slammer Worm
Anomaly analysis work
The four basic approaches to defense in depth
MAN
47. Unified data carrying service - replacing from replay and ATM
What's an easy way to test encryption?
Trojan horse
Multi protocol label switching
Plaintext
48. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
A netcat listener
TFTP
Some reasons to use UDP over TCP
File Integrity checking work
49. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Overview of TCP
Smurf attack
Plaintext
Datagram length of a UDP packet
50. destruction of data - leaking confidential information - providing backdoor access
Network stumbler
Some malware capabilities
Stateless packet filter
The five threat vectors