SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Deep packet inspection
Honeyd
Nmap
Bus Topology
2. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Nmap
Remote maintenance
The OSI model
PAN
3. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Macro virus
Bus Topology
Switches
IDS not
4. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
MAN
Bridge
COM/Script program infector
A blind FTP
5. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
SYN flood
A netmask
ACK piggybacking
CIDR
6. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
IDS not
The OSI Protocol Stack
Hping
Switches
8. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Best way to protect wireless networks
Firewall
Some types of malicious code
Honeyd
9. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
When implementing protocols - what stack should be used?
Macro virus
Asynchronous Transfer Mode
Some common TCP ports
10. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Browsing attack
Vulnerabilities
Some ways to bypass firewall protections
Some NIDS topology limitations
11. Syn - Syn/Ack - Ack
Some Pen Test techniques
The threat vector analysis in defense in depth
Snort
To establish a TCP session
12. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
The four types of events reported by IDS
The three goals of security
Network stumbler
Some other UDP based protocols
13. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Best way to protect wireless networks
Trojan horse
CIDR
Hubs
14. Known - unknown - zero day
Firewall
What categories do vulnerabilities fall into?
Some types of malicious code
ACK piggybacking
15. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Integrity of Data
Log monitoring work?
OS Command Injection defenses
Some NIDS topology limitations
16. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Hping
A network protocol
Some network design objectives
Some NIDS topology limitations
17. Message in its encrypted form
TFTP
Bridge
Ciphertext
Some malware propagation techniques
18. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Rotation?
Shallow packet inspection
Integrity of Data
PAN
19. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
The CIA triad
SYN flood
The protected enclave to defense in depth
Hubs
20. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Some disadvantages of honeypots
What range is a class B network?
IDS signature analysis work
ACK piggybacking
21. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
What's a VLAN
Remote maintenance
Denial of service
Macro virus
22. logic bomb - trojan horse - trap door
Some types of malicious code
Some NIDS topology limitations
Bridge
Integrity of Data
23. Intrusion detection system - it reports attacks against monitored systems/networks
The five threat vectors
IDS
To establish a TCP session
A netcat listener
24. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
The presentation layer
SYN flood
The network layer
Hubs
25. Network scanner.
Nmap
The OSI model
File Integrity checking work
Denial of service
26. Relies on executable code insertion and user interaction to spread
Some other UDP based protocols
Parasitic malware
Network stumbler
Race conditions
27. Uniform protection - protected enclaves - information centric - threat vector analysis
EXE program infector
Best way to protect wireless networks
The four basic approaches to defense in depth
Boot record infector
28. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. Stateful firewalls maintain state of traffic flows
The presentation layer
Nmap scanning techniques
Stateful firewall
Some types of malicious code
30. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
The presentation layer
The OSI model
UDP packet headers
Shallow packet inspection
31. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Ciphertext
Smurf attack
Social engineering
What range is a class A network?
32. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
The Information Centric defense in depth
Defense in depth
Hubs
EXE program infector
33. fast - with little fidelity - examines header information and limited payload data
Port scan
The different cable categories
Shallow packet inspection
Router
34. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Some honeypot advantages
Group
Datagram length of a UDP packet
Alteration of code
35. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Honeypot
Buffer overflow
Some Pen Test techniques
EXE program infector
36. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Permutation
What's a VLAN
File integrity checking work
Stateless packet filter
37. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS data normalization
Stateful firewall
A netmask
Some firewall benefits
38. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
To establish a TCP session
Some external threat concerns
The different cable categories
File integrity checking work
39. The Practice of sending an ACK inside another packet going to the same destination
Ack Piggybacking
Trap door
Address Resolution Protocol (ARP)
IDS signature analysis work
40. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Some Pen Test techniques
Plaintext
Macro virus
The transport layer
41. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
NIDS challenges
Port scan
Plaintext
The Uniform Protection to defense in depth
42. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
The TCP/IP model
The difference in stacks
The Uniform Protection to defense in depth
Social engineering
43. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Honeypot
Denial of service
Total cell size for asynchronous transfer mode (ATM)
Trap door
44. One is for talking - one is for implementing
Some other UDP based protocols
Some malware capabilities
Brute force
The difference in stacks
45. Bits of code embedded in programs to quickly gain access at a later time
Some ways to bypass firewall protections
NAC
The OSI model
Trap door
46. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Worms
When talking about protocols and referencing layers - what stack is used
TFTP
Rotation?
47. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
What range is a class B network?
Some NIDS topology limitations
When implementing protocols - what stack should be used?
What categories do vulnerabilities fall into?
48. Confidentiality - integrity - availability
The three goals of security
Internet
Bus Topology
HIDS monitor
49. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
What range is a class B network?
Deep packet inspection
Social engineering
50. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Some external threat concerns
IDS
Hubs
When talking about protocols and referencing layers - what stack is used