SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Nmap scanning techniques
File Integrity checking work
MAN
IDS
3. Intrusion detection system - it reports attacks against monitored systems/networks
To establish a TCP session
Kismet
MAN
IDS
4. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
War Dialing
Kismet
File Integrity checking work
HIDS monitor
5. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
The Uniform Protection to defense in depth
Some firewall benefits
Switches
Checksum in UDP
6. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
The session layer
TFTP
Some malware propagation techniques
Some disadvantages of honeypots
7. Uniform protection - protected enclaves - information centric - threat vector analysis
Some external threat concerns
Some ways to bypass firewall protections
Defense in depth
The four basic approaches to defense in depth
8. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
What range is a class A network?
Some ways to bypass firewall protections
Some reasons to use UDP over TCP
Some firewall benefits
9. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
The five threat vectors
Logic bomb
Some firewall challenges
Log monitoring work?
10. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
War Dialing
Some types of malicious code
The Information Centric defense in depth
Alteration of code
11. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
Brute force
The difference in stacks
Stateful firewall
File Integrity checking work
12. Relies on executable code insertion and user interaction to spread
Types of ATM virtual circuits
Parasitic malware
Best way to protect wireless networks
Switches
13. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Arbitrary substitution
The presentation layer
IDS signature analysis work
Some common UDP ports
14. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Snort
Some malware capabilities
Group
Router
15. 53 bytes - 48 bytes for data - 5 bytes for the header
What range is a class B network?
Total cell size for asynchronous transfer mode (ATM)
Firewall
A netmask
16. Considered to be a perimeter device
A netcat listener
The protected enclave to defense in depth
Router
SYN flood
17. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The transport layer
CIDR
The TCP/IP model
The session layer
18. Infects MBR - no network spreading potential
Boot record infector
The Uniform Protection to defense in depth
What ways should the crypto key be protected?
Some other UDP based protocols
19. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Some firewall benefits
Some common UDP ports
Deep packet inspection
Some Pen Test techniques
20. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Social engineering
Types of viruses
Remote maintenance
The conficker worm
21. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Some honeypot advantages
Program infector
WAN
Plaintext
22. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Multi protocol label switching
Some other UDP based protocols
Integrity of Data
Race conditions
23. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
ATM work
OS Command Injection defenses
UDP packet headers
Some external threat concerns
24. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
MAN
LAN
Group
File Integrity checking work
25. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Smurf attack
Vulnerabilities
What range is a class A network?
Worms
26. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
The session layer
The data link layer
Multi protocol label switching
Asynchronous Transfer Mode
27. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
File Integrity checking work
Some common TCP ports
Integrity of Data
Vulnerabilities
28. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Nmap scanning techniques
Network stumbler
COM/Script program infector
Some reasons to use TCP over UDP
29. Message in its encrypted form
Ciphertext
What's a VLAN
The conficker worm
Stateless packet filter
30. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
TFTP
Risk
Bus Topology
Some reasons to use TCP over UDP
31. Connects many WANs - MANs - and LANs - provided via ISP
The physical layer stack
Internet
Some Pen Test techniques
Some reasons to use TCP over UDP
32. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
HIDS monitor
Anomaly analysis work
UDP packet headers
Some firewall benefits
33. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Nmap
Some reasons to use TCP over UDP
Address Resolution Protocol (ARP)
Total cell size for asynchronous transfer mode (ATM)
34. Confidentiality - symmetric encryption
Hubs
The goals of cryptography
IDS
Macro virus
35. destruction of data - leaking confidential information - providing backdoor access
Some malware capabilities
A blind FTP
PAN
The CIA triad
36. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Rotation?
Some types of malicious code
Social engineering
Honeypot
37. Known - unknown - zero day
Total cell size for asynchronous transfer mode (ATM)
What categories do vulnerabilities fall into?
Some common TCP ports
MAN
38. Unencrypted message in its original form
ACK piggybacking
Browsing attack
Plaintext
Total cell size for asynchronous transfer mode (ATM)
39. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
The TCP/IP model
NIDS advantages
Program infector
Some firewall challenges
40. Handles transmissions across the physical media like wires - fiber - etc
The physical layer stack
Hping
ATM work
Some firewall benefits
41. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
War Dialing
The protected enclave to defense in depth
The Uniform Protection to defense in depth
LAN
42. Unified data carrying service - replacing from replay and ATM
Trap door
Multi protocol label switching
Honeypot
WAN
43. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Some firewall benefits
Router
Permutation
The five threat vectors
44. Malware - insider threat - natural disaster - terrorism - pandemic
MAN
Hubs
The physical layer stack
What primary threats should be protected against
45. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
What primary threats should be protected against
Buffer overflow
Anomaly analysis work
IDS data normalization
46. Syn - Syn/Ack - Ack
WAN
To establish a TCP session
Some NIDS topology limitations
The network layer
47. Bits of code embedded in programs to quickly gain access at a later time
Types of viruses
Trap door
The different cable categories
Arbitrary substitution
48. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
Total cell size for asynchronous transfer mode (ATM)
HIDS monitor
Trap door
Some external threat concerns
49. It interacts with the application layer to determine which network services will be required
The network layer
the application layer
Types of viruses
Browsing attack
50. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
SQL Slammer Worm
NIDS advantages
Ack Piggybacking
What categories do vulnerabilities fall into?