SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Connects many WANs - MANs - and LANs - provided via ISP
A network protocol
Some reasons to use UDP over TCP
Internet
Worms
2. Personal area network - phone tethering - bluetooth - etc
PAN
The OSI Protocol Stack
Best way to protect wireless networks
Types of viruses
3. Full open - half open (stealth scan) - UDP - Ping
Ack Piggybacking
Port scan
COM/Script program infector
Nmap scanning techniques
4. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
Some NIDS topology limitations
Plaintext
Integrity of Data
5. Bits of code embedded in programs to quickly gain access at a later time
Trap door
Some network design objectives
Overview of TCP
The different cable categories
6. Known - unknown - zero day
Rotation?
The data link layer
Total cell size for asynchronous transfer mode (ATM)
What categories do vulnerabilities fall into?
7. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
The OSI model
The difference in stacks
Macro virus
When setting up a virtual circuit
8. Handles transmissions across the physical media like wires - fiber - etc
SQL Slammer Worm
Some ways to bypass firewall protections
The physical layer stack
What range is a class A network?
9. One is for talking - one is for implementing
The difference in stacks
When setting up a virtual circuit
SYN flood
Wardriving
10. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The TCP/IP model
The goals of cryptography
Asynchronous Transfer Mode
Some common UDP ports
11. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Multi protocol label switching
Switches
Stateless packet filter
Proxy or application gateway
12. destruction of data - leaking confidential information - providing backdoor access
The session layer
The physical layer stack
Some malware capabilities
What range is a class A network?
13. Relies on executable code insertion and user interaction to spread
Parasitic malware
Asynchronous Transfer Mode
Browsing attack
Honeyd
14. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
UDP packet headers
Anomaly analysis work
IDS data normalization
Network stumbler
15. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
The OSI Protocol Stack
IDS not
Anomaly analysis work
Risk
16. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
NIDS advantages
War Dialing
When talking about protocols and referencing layers - what stack is used
Types of viruses
17. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
The three goals of security
When setting up a virtual circuit
Ack Piggybacking
TFTP
18. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Some firewall benefits
Wardriving
The threat vector analysis in defense in depth
Overview of TCP
19. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
The Information Centric defense in depth
Types of ATM virtual circuits
LAN
SYN flood
20. Malware - insider threat - natural disaster - terrorism - pandemic
Some firewall challenges
Logic bomb
What primary threats should be protected against
Trojan horse
21. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
Ack Piggybacking
UDP packet headers
Buffer overflow
Stateless packet filter
22. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
The different cable categories
Browsing attack
Proxy or application gateway
SYN flood
23. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Some other UDP based protocols
Bridge
Some reasons to use UDP over TCP
A netmask
24. Unencrypted message in its original form
Checksum in UDP
When implementing protocols - what stack should be used?
Some disadvantages of honeypots
Plaintext
25. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS data normalization
ATM work
The protected enclave to defense in depth
The transport layer
26. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Smurf attack
Anomaly analysis work
Group
When implementing protocols - what stack should be used?
27. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some malware capabilities
The Uniform Protection to defense in depth
Some NIDS topology limitations
The network layer
28. Message in its encrypted form
Ciphertext
Rootkit
Datagram length of a UDP packet
Defense in depth
29. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
TFTP
Some Pen Test techniques
A netcat listener
File Integrity checking work
30. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Ciphertext
Some ways to bypass firewall protections
Browsing attack
3-way handshake
31. FIN 130 - ACK 131 - FIN 570 - ACK 571
To close a TCP session
PAN
IDS signature analysis work
Denial of service
32. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Some ways to bypass firewall protections
Alteration of code
Honeyd
Bus Topology
33. Infects MBR - no network spreading potential
PAN
Bridge
Boot record infector
A blind FTP
34. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
the application layer
SQL Slammer Worm
Log monitoring work?
Denial of service
35. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Best way to protect wireless networks
The OSI Protocol Stack
LAN
Denial of service
36. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Denial of service
The three goals of security
Brute force
The goals of cryptography
37. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
To establish a TCP session
OS Command Injection defenses
War Dialing
The different cable categories
38. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
What range is a class A network?
Group
Stateless packet filter
To establish a TCP session
39. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
WAN
Brute force
Trap door
SQL Slammer Worm
40. It interacts with the application layer to determine which network services will be required
The three goals of security
Nmap scanning techniques
the application layer
The OSI model
41. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
Program infector
TFTP
HIDS monitor
NIDS advantages
42. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Bus Topology
Some common TCP ports
What threats should be protected against - based on threat levels
ACK piggybacking
43. Considered to be a perimeter device
Total cell size for asynchronous transfer mode (ATM)
Router
Some reasons to use TCP over UDP
Some reasons to use UDP over TCP
44. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
PAN
No State Inspection ACK flag set
Some network design objectives
Ack Piggybacking
45. Protected at rest - protected in transit - secure the key
The data link layer
The difference in stacks
Some FTP dangers
What ways should the crypto key be protected?
46. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Datagram length of a UDP packet
The different cable categories
Parasitic malware
Vulnerabilities
47. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Risk
Some malware capabilities
The presentation layer
WAN
48. Confidentiality - integrity - availability
What range is a class B network?
3-way handshake
Alteration of code
The CIA triad
49. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
To establish a TCP session
Arbitrary substitution
LAN
File Integrity checking work
50. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
Multi protocol label switching
Integrity of Data
A netcat listener
The Uniform Protection to defense in depth