SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Social engineering
The data link layer
Arbitrary substitution
Some Pen Test techniques
2. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
What range is a class C network?
Datagram length of a UDP packet
A blind FTP
The session layer
3. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Some network design objectives
Honeypot
NIDS advantages
Kismet
4. Handles transmissions across the physical media like wires - fiber - etc
The physical layer stack
Some firewall challenges
Macro virus
A network protocol
5. Simple attack done by simply browsing available information that's allowed on a local network.
The difference in stacks
IDS
Snort
Browsing attack
6. The Practice of sending an ACK inside another packet going to the same destination
Ack Piggybacking
Buffer overflow
The Information Centric defense in depth
Logic bomb
7. OSI
Nmap
When talking about protocols and referencing layers - what stack is used
Firewall
Some types of malicious code
8. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Best way to protect wireless networks
No State Inspection ACK flag set
Kismet
The threat vector analysis in defense in depth
9. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Stateless packet filter
Some Pen Test techniques
Arbitrary substitution
The three goals of security
10. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
Permutation
Multi protocol label switching
The different cable categories
3-way handshake
11. Personal area network - phone tethering - bluetooth - etc
PAN
Some malware capabilities
LAN
The Information Centric defense in depth
12. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
The OSI model
Risk
No State Inspection ACK flag set
What categories do vulnerabilities fall into?
13. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Nmap scanning techniques
Bus Topology
Denial of service
ATM work
14. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
The four types of events reported by IDS
A netcat listener
SQL Slammer Worm
When implementing protocols - what stack should be used?
15. logic bomb - trojan horse - trap door
Some external threat concerns
Program infector
Some types of malicious code
UDP packet headers
16. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
LAN
TFTP
The OSI model
Stateful firewall
17. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
DDoS attack
Types of viruses
When talking about protocols and referencing layers - what stack is used
NIDS challenges
18. True positive - false positive - true negative - false negative
Deep packet inspection
The four types of events reported by IDS
Brute force
Stateful firewall
19. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
Rotation?
Honeyd
What range is a class C network?
Some common UDP ports
20. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
IDS
ATM work
Stateless packet filter
NIDS advantages
21. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Smurf attack
What range is a class A network?
Risk
Shallow packet inspection
22. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Macro virus
Some common UDP ports
The Information Centric defense in depth
The four basic approaches to defense in depth
23. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
DDoS attack
IDS not
the application layer
LAN
24. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
MAN
Risk
No State Inspection ACK flag set
When implementing protocols - what stack should be used?
25. Bits of code embedded in programs to quickly gain access at a later time
Trap door
Some FTP dangers
The threat vector analysis in defense in depth
Logic bomb
26. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
EXE program infector
Address Resolution Protocol (ARP)
The difference in stacks
WAN
27. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Datagram length of a UDP packet
Hping
The difference in stacks
OS Command Injection defenses
28. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Types of ATM virtual circuits
Rotation?
To establish a TCP session
NAC
29. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Denial of service
Proxy or application gateway
NAC
Internet
30. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
DDoS attack
Alteration of code
Group
The three goals of security
31. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Smurf attack
IDS data normalization
WAN
Some other UDP based protocols
32. 53 bytes - 48 bytes for data - 5 bytes for the header
Total cell size for asynchronous transfer mode (ATM)
Nmap
Kismet
the application layer
33. Syn - Syn/Ack - Ack
To establish a TCP session
Rotation?
The difference in stacks
Log monitoring work?
34. Confidentiality - integrity - availability
The four types of events reported by IDS
The three goals of security
Bridge
CIDR
35. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Best way to protect wireless networks
Stateful firewall
Risk
NIDS challenges
36. Malware - insider threat - natural disaster - terrorism - pandemic
What primary threats should be protected against
NIDS advantages
Some FTP dangers
Bus Topology
37. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Some Pen Test techniques
Deep packet inspection
NIDS advantages
Types of viruses
38. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Asynchronous Transfer Mode
When talking about protocols and referencing layers - what stack is used
Deep packet inspection
A network protocol
39. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
IDS not
The five threat vectors
NIDS advantages
Network stumbler
40. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Worms
Integrity of Data
The presentation layer
Snort
41. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
IDS data normalization
Address resolution protocol
Stateless packet filter
Logic bomb
43. Confidentiality - symmetric encryption
The goals of cryptography
IDS signature analysis work
Some disadvantages of honeypots
Some malware capabilities
44. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Some types of malicious code
Deep packet inspection
Hubs
What categories do vulnerabilities fall into?
45. Network scanner.
The data link layer
Nmap
Buffer overflow
EXE program infector
46. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
The five threat vectors
The three goals of security
Anomaly analysis work
The presentation layer
47. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
Parasitic malware
Some FTP dangers
Some malware propagation techniques
NAC
48. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Address Resolution Protocol (ARP)
The threat vector analysis in defense in depth
Some other UDP based protocols
To establish a TCP session
49. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
File integrity checking work
Ack Piggybacking
Some types of malicious code
The session layer
50. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
Checksum in UDP
Best way to protect wireless networks
The transport layer
EXE program infector