SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
Port scan
Boot record infector
Rootkit
2. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
The protected enclave to defense in depth
Stateless packet filter
Trojan horse
The threat vector analysis in defense in depth
3. Connects many WANs - MANs - and LANs - provided via ISP
The conficker worm
The five threat vectors
The Uniform Protection to defense in depth
Internet
4. Confidentiality - integrity - availability
Internet
The session layer
No State Inspection ACK flag set
The CIA triad
5. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Group
Buffer overflow
What range is a class A network?
Stateless packet filter
6. True positive - false positive - true negative - false negative
The four types of events reported by IDS
The five threat vectors
Multi protocol label switching
What categories do vulnerabilities fall into?
7. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Risk
SQL Slammer Worm
The Uniform Protection to defense in depth
Some disadvantages of honeypots
8. Protected at rest - protected in transit - secure the key
What ways should the crypto key be protected?
Anomaly analysis work
Defense in depth
What range is a class B network?
9. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Stateful firewall
Rotation?
Bus Topology
Some honeypot advantages
10. Known - unknown - zero day
The conficker worm
NAC
The four basic approaches to defense in depth
What categories do vulnerabilities fall into?
11. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Group
Hping
The CIA triad
Internet
12. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
What's an easy way to test encryption?
Program infector
Race conditions
To establish a TCP session
13. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
NIDS challenges
TFTP
The different cable categories
COM/Script program infector
14. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
What range is a class A network?
What's an easy way to test encryption?
Checksum in UDP
The four basic approaches to defense in depth
15. Simple attack done by simply browsing available information that's allowed on a local network.
Nmap
NIDS advantages
Browsing attack
COM/Script program infector
16. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
The session layer
Trojan horse
DDoS attack
MAN
17. One is for talking - one is for implementing
The OSI model
The data link layer
The difference in stacks
What categories do vulnerabilities fall into?
18. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Alteration of code
Some FTP dangers
Kismet
Group
19. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Alteration of code
Stateless packet filter
Some other UDP based protocols
CIDR
20. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Some firewall benefits
Some external threat concerns
The threat vector analysis in defense in depth
Some Pen Test techniques
21. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
Logic bomb
The network layer
LAN
What primary threats should be protected against
22. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Bridge
UDP packet headers
Wardriving
The CIA triad
23. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Integrity of Data
Internet
The difference in stacks
IDS
24. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Overview of TCP
Remote maintenance
Nmap
MAN
26. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
War Dialing
Some common TCP ports
Some types of malicious code
LAN
27. logic bomb - trojan horse - trap door
TFTP
Some types of malicious code
Risk
Ack Piggybacking
28. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
File integrity checking work
Multi protocol label switching
Worms
Types of ATM virtual circuits
29. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Wardriving
Vulnerabilities
Nmap
The data link layer
30. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Ack Piggybacking
Some reasons to use UDP over TCP
COM/Script program infector
What's a VLAN
31. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Rotation?
Multi protocol label switching
The physical layer stack
MAN
32. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
3-way handshake
Best way to protect wireless networks
The physical layer stack
Bus Topology
33. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
To establish a TCP session
What threats should be protected against - based on threat levels
NIDS advantages
Network stumbler
34. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Honeyd
What primary threats should be protected against
NIDS challenges
Bridge
35. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Asynchronous Transfer Mode
IDS data normalization
The Information Centric defense in depth
Ciphertext
36. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
Smurf attack
CIDR
Bridge
The TCP/IP model
37. Infects MBR - no network spreading potential
Boot record infector
Some reasons to use TCP over UDP
Port scan
The CIA triad
38. Intrusion detection system - it reports attacks against monitored systems/networks
Deep packet inspection
Remote maintenance
Nmap scanning techniques
IDS
39. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Multi protocol label switching
File Integrity checking work
TFTP
No State Inspection ACK flag set
40. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
The five threat vectors
The network layer
3-way handshake
Some common TCP ports
41. Unencrypted message in its original form
COM/Script program infector
Stateless packet filter
Shallow packet inspection
Plaintext
42. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
The Information Centric defense in depth
Ack Piggybacking
The physical layer stack
Hping
43. Uniform protection - protected enclaves - information centric - threat vector analysis
The four basic approaches to defense in depth
Defense in depth
When talking about protocols and referencing layers - what stack is used
Group
44. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
File Integrity checking work
Hubs
Overview of TCP
OS Command Injection defenses
45. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Alteration of code
Firewall
Total cell size for asynchronous transfer mode (ATM)
A network protocol
46. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Snort
SYN flood
Types of viruses
Some FTP dangers
47. Bits of code embedded in programs to quickly gain access at a later time
Trap door
File integrity checking work
Switches
Firewall
48. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Snort
UDP packet headers
The Uniform Protection to defense in depth
NIDS advantages
49. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Smurf attack
3-way handshake
DDoS attack
Datagram length of a UDP packet
50. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
The network layer
Some NIDS topology limitations
Datagram length of a UDP packet
Alteration of code