SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The practice of sending an ACK inside another packet going to the same destination
Nmap scanning techniques
DDoS attack
The CIA triad
ACK piggybacking
2. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Snort
Log monitoring work?
Stateless packet filter
Plaintext
4. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Firewall
Boot record infector
MAN
NIDS challenges
5. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Group
A netmask
The four types of events reported by IDS
Address Resolution Protocol (ARP)
6. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
The difference in stacks
CIDR
Some reasons to use UDP over TCP
Plaintext
7. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
LAN
Firewall
What categories do vulnerabilities fall into?
Some ways to bypass firewall protections
8. It makes sure the data sent from one side to the other is in a format useful to the other side
The transport layer
Rotation?
The presentation layer
Log monitoring work?
9. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Anomaly analysis work
Checksum in UDP
The Uniform Protection to defense in depth
What primary threats should be protected against
10. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Some firewall challenges
NIDS advantages
Switches
The four types of events reported by IDS
11. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Checksum in UDP
Some Pen Test techniques
Nmap
NIDS challenges
12. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
The Uniform Protection to defense in depth
Trojan horse
Bus Topology
Permutation
13. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
To close a TCP session
What threats should be protected against - based on threat levels
Some malware propagation techniques
Switches
14. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Some reasons to use TCP over UDP
Nmap scanning techniques
Types of viruses
File integrity checking work
15. Intrusion detection system - it reports attacks against monitored systems/networks
Trap door
IDS
CIDR
The five threat vectors
16. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Kismet
Logic bomb
Internet
Race conditions
17. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
Types of viruses
IDS data normalization
EXE program infector
Browsing attack
18. It interacts with the application layer to determine which network services will be required
Kismet
the application layer
When talking about protocols and referencing layers - what stack is used
Stateful firewall
19. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
LAN
Address resolution protocol
A network protocol
OS Command Injection defenses
20. Going around with equipment to detect wireless networks
CIDR
Rootkit
Wardriving
What categories do vulnerabilities fall into?
21. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
3-way handshake
What range is a class A network?
Remote maintenance
Proxy or application gateway
22. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
The Information Centric defense in depth
SQL Slammer Worm
A netmask
Vulnerabilities
23. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
The OSI model
Parasitic malware
The conficker worm
The CIA triad
24. Confidentiality - integrity - availability
The OSI Protocol Stack
Checksum in UDP
The CIA triad
Best way to protect wireless networks
25. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
The session layer
Types of viruses
Datagram length of a UDP packet
Hubs
26. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
3-way handshake
Rootkit
Address Resolution Protocol (ARP)
Some NIDS topology limitations
27. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
The OSI Protocol Stack
Port scan
Group
Hping
28. Attaches itself to existing program files and activated when the exe is launched
Some common TCP ports
What range is a class B network?
Program infector
When setting up a virtual circuit
29. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
When implementing protocols - what stack should be used?
WAN
IDS
Nmap scanning techniques
30. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Trap door
A netcat listener
Plaintext
Denial of service
31. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
The CIA triad
A blind FTP
Deep packet inspection
32. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Group
Datagram length of a UDP packet
COM/Script program infector
Nmap
33. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Defense in depth
Trojan horse
DDoS attack
CIDR
34. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
IDS data normalization
Best way to protect wireless networks
Buffer overflow
Asynchronous Transfer Mode
35. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Some common TCP ports
Macro virus
The Information Centric defense in depth
Some disadvantages of honeypots
36. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
What threats should be protected against - based on threat levels
Datagram length of a UDP packet
Browsing attack
Asynchronous Transfer Mode
37. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
LAN
CIDR
the application layer
WAN
38. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
The OSI Protocol Stack
Program infector
What range is a class C network?
Shallow packet inspection
39. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
Browsing attack
The threat vector analysis in defense in depth
Shallow packet inspection
File Integrity checking work
40. Message in its encrypted form
Some malware capabilities
Wardriving
Ciphertext
The protected enclave to defense in depth
41. Uniform protection - protected enclaves - information centric - threat vector analysis
LAN
Some NIDS topology limitations
The four basic approaches to defense in depth
The physical layer stack
42. Simple attack done by simply browsing available information that's allowed on a local network.
Browsing attack
Log monitoring work?
A netcat listener
Vulnerabilities
43. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bridge
When setting up a virtual circuit
SQL Slammer Worm
Alteration of code
44. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
The Uniform Protection to defense in depth
IDS signature analysis work
Some FTP dangers
War Dialing
45. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Checksum in UDP
When talking about protocols and referencing layers - what stack is used
Plaintext
Hubs
46. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Multi protocol label switching
A network protocol
The session layer
The data link layer
47. Unencrypted message in its original form
Some types of malicious code
Some Pen Test techniques
What ways should the crypto key be protected?
Plaintext
48. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Some other UDP based protocols
Alteration of code
War Dialing
TFTP
49. FIN 130 - ACK 131 - FIN 570 - ACK 571
To close a TCP session
The four types of events reported by IDS
Plaintext
Rotation?
50. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
What range is a class C network?
The goals of cryptography
File Integrity checking work