SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
WAN
Trap door
the application layer
When setting up a virtual circuit
2. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
The different cable categories
Some reasons to use UDP over TCP
IDS
Buffer overflow
3. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
The transport layer
What primary threats should be protected against
Ciphertext
Firewall
4. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Network stumbler
Types of ATM virtual circuits
Group
Hping
5. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
OS Command Injection defenses
Rootkit
What range is a class B network?
Plaintext
6. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Social engineering
File integrity checking work
Integrity of Data
Some reasons to use TCP over UDP
7. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Internet
Group
What range is a class A network?
Snort
8. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Some common UDP ports
Risk
Asynchronous Transfer Mode
the application layer
9. It interacts with the application layer to determine which network services will be required
NAC
Integrity of Data
Some external threat concerns
the application layer
10. Infects MBR - no network spreading potential
Boot record infector
Proxy or application gateway
The five threat vectors
UDP packet headers
11. destruction of data - leaking confidential information - providing backdoor access
Denial of service
ACK piggybacking
Some malware capabilities
Trap door
12. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Ack Piggybacking
SYN flood
Worms
The CIA triad
13. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Address Resolution Protocol (ARP)
Proxy or application gateway
Macro virus
CIDR
14. Personal area network - phone tethering - bluetooth - etc
ACK piggybacking
Bridge
TFTP
PAN
15. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Trap door
CIDR
Proxy or application gateway
What primary threats should be protected against
16. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
Risk
PAN
Some Pen Test techniques
What range is a class C network?
17. Known - unknown - zero day
Best way to protect wireless networks
What categories do vulnerabilities fall into?
Buffer overflow
Wardriving
18. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bus Topology
Bridge
Shallow packet inspection
ACK piggybacking
19. Confidentiality - symmetric encryption
Parasitic malware
The goals of cryptography
Total cell size for asynchronous transfer mode (ATM)
MAN
20. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Group
The OSI Protocol Stack
SYN flood
Permutation
21. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
Some firewall challenges
COM/Script program infector
The network layer
Best way to protect wireless networks
22. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Overview of TCP
What primary threats should be protected against
The data link layer
EXE program infector
23. An attempt to gain access by bombarding it with guesses until the password is found.
Brute force
Log monitoring work?
Datagram length of a UDP packet
the application layer
24. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
ACK piggybacking
PAN
EXE program infector
Some ways to bypass firewall protections
25. Bits of code embedded in programs to quickly gain access at a later time
Trap door
Some reasons to use TCP over UDP
Honeypot
The network layer
26. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
The four basic approaches to defense in depth
DDoS attack
What's an easy way to test encryption?
Some honeypot advantages
27. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
The data link layer
NIDS advantages
No State Inspection ACK flag set
Macro virus
28. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
File Integrity checking work
Some external threat concerns
Bus Topology
The OSI Protocol Stack
29. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Worms
Macro virus
Some external threat concerns
War Dialing
30. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Some ways to bypass firewall protections
A netmask
Some network design objectives
Stateless packet filter
31. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Macro virus
Rotation?
Checksum in UDP
The protected enclave to defense in depth
32. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
NIDS advantages
The different cable categories
Boot record infector
Some malware propagation techniques
33. It handles the establishment and maintenance of connections between systems
Smurf attack
The session layer
The different cable categories
IDS signature analysis work
34. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
A blind FTP
Social engineering
PAN
The three goals of security
35. Connects many WANs - MANs - and LANs - provided via ISP
HIDS monitor
Some firewall challenges
The Information Centric defense in depth
Internet
36. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
War Dialing
ATM work
Some common UDP ports
Some external threat concerns
37. Full open - half open (stealth scan) - UDP - Ping
What threats should be protected against - based on threat levels
Smurf attack
Nmap scanning techniques
OS Command Injection defenses
38. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
The five threat vectors
EXE program infector
IDS data normalization
Rootkit
39. logic bomb - trojan horse - trap door
Some types of malicious code
Bridge
The presentation layer
Some malware capabilities
40. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
When implementing protocols - what stack should be used?
OS Command Injection defenses
The three goals of security
Wardriving
41. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Integrity of Data
Proxy or application gateway
Datagram length of a UDP packet
Anomaly analysis work
42. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
The Uniform Protection to defense in depth
Port scan
Some reasons to use UDP over TCP
The transport layer
43. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
To close a TCP session
Race conditions
Some honeypot advantages
Smurf attack
44. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Internet
Some types of malicious code
Some firewall benefits
Rootkit
45. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
The five threat vectors
What categories do vulnerabilities fall into?
A netcat listener
The network layer
46. Simple attack done by simply browsing available information that's allowed on a local network.
Proxy or application gateway
Some Pen Test techniques
The four basic approaches to defense in depth
Browsing attack
47. OSI
Some honeypot advantages
The CIA triad
Plaintext
When talking about protocols and referencing layers - what stack is used
48. Confidentiality - integrity - availability
Honeypot
The CIA triad
IDS
Nmap
49. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Kismet
File Integrity checking work
Boot record infector
Some FTP dangers
50. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
CIDR
No State Inspection ACK flag set
SYN flood
Some common TCP ports
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests