SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Personal area network - phone tethering - bluetooth - etc
PAN
Some Pen Test techniques
Social engineering
3-way handshake
2. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Logic bomb
File integrity checking work
Some network design objectives
Ciphertext
3. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Some firewall challenges
Deep packet inspection
When implementing protocols - what stack should be used?
The different cable categories
4. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
OS Command Injection defenses
IDS signature analysis work
What primary threats should be protected against
Some network design objectives
6. Going around with equipment to detect wireless networks
The threat vector analysis in defense in depth
Wardriving
Trojan horse
NIDS advantages
7. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
PAN
ACK piggybacking
Stateless packet filter
Some firewall challenges
8. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Browsing attack
The data link layer
Ack Piggybacking
OS Command Injection defenses
9. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Router
ACK piggybacking
COM/Script program infector
Stateless packet filter
10. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Some malware capabilities
The threat vector analysis in defense in depth
Anomaly analysis work
The four types of events reported by IDS
11. OSI
The physical layer stack
When talking about protocols and referencing layers - what stack is used
A blind FTP
PAN
12. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
SQL Slammer Worm
Multi protocol label switching
Trap door
A network protocol
13. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
The difference in stacks
Honeyd
Kismet
The physical layer stack
14. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
IDS not
Overview of TCP
Types of viruses
Router
15. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
Browsing attack
What range is a class C network?
What primary threats should be protected against
When talking about protocols and referencing layers - what stack is used
16. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Port scan
The Information Centric defense in depth
Some Pen Test techniques
Address Resolution Protocol (ARP)
17. Intrusion detection system - it reports attacks against monitored systems/networks
Group
Address Resolution Protocol (ARP)
NAC
IDS
18. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
A netmask
Honeyd
Network stumbler
The four basic approaches to defense in depth
19. Stateful firewalls maintain state of traffic flows
Stateful firewall
Total cell size for asynchronous transfer mode (ATM)
SQL Slammer Worm
Some FTP dangers
20. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
IDS signature analysis work
CIDR
NIDS advantages
Snort
21. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Bus Topology
The transport layer
Some network design objectives
Smurf attack
22. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
EXE program infector
Honeyd
Some Pen Test techniques
Some malware propagation techniques
23. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
ACK piggybacking
A netcat listener
Address resolution protocol
Some common TCP ports
24. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
The four types of events reported by IDS
Trap door
Smurf attack
File Integrity checking work
25. It handles the establishment and maintenance of connections between systems
Remote maintenance
The session layer
Honeyd
No State Inspection ACK flag set
26. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Program infector
Bridge
Rotation?
The protected enclave to defense in depth
27. It interacts with the application layer to determine which network services will be required
Defense in depth
Bridge
Brute force
the application layer
28. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
What primary threats should be protected against
The TCP/IP model
Logic bomb
Arbitrary substitution
29. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
The four basic approaches to defense in depth
PAN
Stateless packet filter
Switches
30. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Types of ATM virtual circuits
Defense in depth
What range is a class A network?
Some external threat concerns
31. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. destruction of data - leaking confidential information - providing backdoor access
File integrity checking work
Some FTP dangers
Log monitoring work?
Some malware capabilities
33. Confidentiality - integrity - availability
Some NIDS topology limitations
The three goals of security
What range is a class B network?
What ways should the crypto key be protected?
34. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
What range is a class C network?
To close a TCP session
Best way to protect wireless networks
PAN
35. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Hubs
TFTP
Ciphertext
Log monitoring work?
36. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
To close a TCP session
Stateful firewall
CIDR
37. Attaches itself to existing program files and activated when the exe is launched
Program infector
Integrity of Data
Stateless packet filter
Some FTP dangers
38. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
MAN
The Uniform Protection to defense in depth
When implementing protocols - what stack should be used?
IDS signature analysis work
39. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Address resolution protocol
LAN
Remote maintenance
A blind FTP
40. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
File Integrity checking work
Some malware propagation techniques
UDP packet headers
Rootkit
41. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Types of viruses
The TCP/IP model
DDoS attack
The protected enclave to defense in depth
42. Considered to be a perimeter device
Smurf attack
Total cell size for asynchronous transfer mode (ATM)
Router
Honeyd
43. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
Arbitrary substitution
HIDS monitor
Some Pen Test techniques
What categories do vulnerabilities fall into?
44. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
What range is a class A network?
PAN
Ciphertext
WAN
45. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Overview of TCP
Some other UDP based protocols
Browsing attack
TFTP
46. Full open - half open (stealth scan) - UDP - Ping
Nmap scanning techniques
Some ways to bypass firewall protections
What categories do vulnerabilities fall into?
Trap door
47. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Vulnerabilities
Bridge
Snort
Buffer overflow
48. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
CIDR
IDS data normalization
Snort
What's an easy way to test encryption?
49. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
The three goals of security
Some ways to bypass firewall protections
Rootkit
Some other UDP based protocols
50. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
The four basic approaches to defense in depth
MAN
The five threat vectors
COM/Script program infector
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests