SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
Risk
Buffer overflow
the application layer
IDS signature analysis work
2. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Bridge
Snort
Stateful firewall
A network protocol
3. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
PAN
SYN flood
Defense in depth
Some firewall challenges
4. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Hubs
OS Command Injection defenses
Risk
Some network design objectives
5. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
LAN
Nmap scanning techniques
Worms
Bridge
7. One is for talking - one is for implementing
The difference in stacks
What range is a class C network?
3-way handshake
Deep packet inspection
8. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
Some reasons to use TCP over UDP
A blind FTP
Browsing attack
Trap door
9. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
The different cable categories
SYN flood
Some reasons to use TCP over UDP
Some firewall challenges
10. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
File integrity checking work
Smurf attack
The TCP/IP model
NAC
11. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Switches
The session layer
Some firewall benefits
A blind FTP
12. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
The OSI Protocol Stack
Some firewall challenges
File Integrity checking work
Some reasons to use UDP over TCP
13. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Smurf attack
Proxy or application gateway
What range is a class A network?
When setting up a virtual circuit
14. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Types of viruses
Macro virus
Some FTP dangers
Smurf attack
15. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Worms
File Integrity checking work
The OSI model
Nmap
16. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Deep packet inspection
Multi protocol label switching
The data link layer
The four types of events reported by IDS
17. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Best way to protect wireless networks
Stateful firewall
IDS data normalization
The conficker worm
18. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Defense in depth
Honeypot
Bridge
Proxy or application gateway
19. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Bus Topology
COM/Script program infector
ATM work
Address Resolution Protocol (ARP)
20. Uniform protection - protected enclaves - information centric - threat vector analysis
Asynchronous Transfer Mode
Internet
When implementing protocols - what stack should be used?
The four basic approaches to defense in depth
21. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
What range is a class C network?
Alteration of code
The Information Centric defense in depth
22. Trying to ID modems in a telephone exchange that may be susceptible to compromise
OS Command Injection defenses
War Dialing
Address Resolution Protocol (ARP)
Integrity of Data
23. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Firewall
Nmap scanning techniques
Smurf attack
Integrity of Data
24. Intrusion detection system - it reports attacks against monitored systems/networks
File integrity checking work
The difference in stacks
Plaintext
IDS
25. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Bridge
Remote maintenance
To close a TCP session
Hping
26. Protected at rest - protected in transit - secure the key
LAN
What's an easy way to test encryption?
the application layer
What ways should the crypto key be protected?
27. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
The four basic approaches to defense in depth
Denial of service
the application layer
OS Command Injection defenses
28. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
UDP packet headers
NIDS advantages
What primary threats should be protected against
Parasitic malware
29. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
A netmask
The threat vector analysis in defense in depth
CIDR
To establish a TCP session
30. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Checksum in UDP
Shallow packet inspection
The protected enclave to defense in depth
To close a TCP session
31. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
SYN flood
EXE program infector
Some malware propagation techniques
A netcat listener
32. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Smurf attack
Trap door
What threats should be protected against - based on threat levels
MAN
33. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Log monitoring work?
Types of ATM virtual circuits
The protected enclave to defense in depth
To establish a TCP session
34. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Buffer overflow
Alteration of code
Address Resolution Protocol (ARP)
The OSI model
35. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
IDS not
The goals of cryptography
Bridge
NIDS challenges
36. Personal area network - phone tethering - bluetooth - etc
Some ways to bypass firewall protections
PAN
The OSI Protocol Stack
Hubs
37. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
SQL Slammer Worm
Trap door
The presentation layer
UDP packet headers
38. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
IDS data normalization
Rootkit
Some NIDS topology limitations
Anomaly analysis work
39. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Network stumbler
Port scan
What range is a class A network?
Some ways to bypass firewall protections
40. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
What's an easy way to test encryption?
Defense in depth
Some malware capabilities
TFTP
41. Intellectual property - business goals - validated data - historical
Browsing attack
What ways should the crypto key be protected?
What threats should be protected against - based on threat levels
SYN flood
42. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
What ways should the crypto key be protected?
SYN flood
Macro virus
43. Full open - half open (stealth scan) - UDP - Ping
Overview of TCP
The goals of cryptography
Nmap scanning techniques
What's an easy way to test encryption?
44. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
The three goals of security
Some common TCP ports
Port scan
Integrity of Data
45. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
SQL Slammer Worm
Trap door
UDP packet headers
46. 53 bytes - 48 bytes for data - 5 bytes for the header
Some disadvantages of honeypots
Trojan horse
NIDS challenges
Total cell size for asynchronous transfer mode (ATM)
47. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
The OSI model
Arbitrary substitution
A network protocol
What range is a class B network?
48. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Rotation?
Best way to protect wireless networks
Some other UDP based protocols
Some honeypot advantages
49. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
LAN
What range is a class A network?
Checksum in UDP
Asynchronous Transfer Mode
50. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Anomaly analysis work
WAN
IDS not
Logic bomb