SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Some reasons to use TCP over UDP
IDS not
Permutation
LAN
2. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Some disadvantages of honeypots
Buffer overflow
What's an easy way to test encryption?
The Uniform Protection to defense in depth
3. Simple attack done by simply browsing available information that's allowed on a local network.
Best way to protect wireless networks
IDS
Some common TCP ports
Browsing attack
4. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Some common TCP ports
DDoS attack
Types of ATM virtual circuits
Some reasons to use UDP over TCP
5. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
WAN
OS Command Injection defenses
When talking about protocols and referencing layers - what stack is used
UDP packet headers
6. Message in its encrypted form
Deep packet inspection
COM/Script program infector
To close a TCP session
Ciphertext
7. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
What primary threats should be protected against
Honeypot
What's an easy way to test encryption?
Risk
8. An attempt to gain access by bombarding it with guesses until the password is found.
Switches
SYN flood
Brute force
Log monitoring work?
9. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Some other UDP based protocols
The four types of events reported by IDS
The OSI Protocol Stack
EXE program infector
10. Unencrypted message in its original form
Datagram length of a UDP packet
Plaintext
Race conditions
Overview of TCP
11. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
The OSI model
Bridge
PAN
Internet
12. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Arbitrary substitution
Ciphertext
Vulnerabilities
Ack Piggybacking
13. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
NIDS advantages
To establish a TCP session
Rotation?
IDS data normalization
14. It handles the establishment and maintenance of connections between systems
The session layer
Honeypot
Stateless packet filter
Kismet
15. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
OS Command Injection defenses
Ciphertext
Some NIDS topology limitations
The TCP/IP model
16. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
To close a TCP session
Nmap
Kismet
HIDS monitor
17. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Denial of service
Remote maintenance
A netcat listener
A blind FTP
18. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
The Uniform Protection to defense in depth
Some Pen Test techniques
Asynchronous Transfer Mode
ACK piggybacking
19. Considered to be a perimeter device
Router
Boot record infector
To close a TCP session
Program infector
20. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
What threats should be protected against - based on threat levels
The five threat vectors
EXE program infector
The different cable categories
21. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
Address Resolution Protocol (ARP)
The network layer
Some common UDP ports
Defense in depth
22. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Trap door
Trojan horse
Hubs
Address Resolution Protocol (ARP)
23. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Logic bomb
Switches
Hubs
UDP packet headers
24. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
The physical layer stack
Some disadvantages of honeypots
Macro virus
A netcat listener
25. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
What's a VLAN
Nmap scanning techniques
CIDR
3-way handshake
26. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Proxy or application gateway
Risk
Anomaly analysis work
27. Infects MBR - no network spreading potential
The OSI Protocol Stack
Program infector
Alteration of code
Boot record infector
28. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Some common UDP ports
Firewall
The transport layer
Some malware propagation techniques
29. Syn - Syn/Ack - Ack
To establish a TCP session
Remote maintenance
What range is a class C network?
What range is a class B network?
30. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
The OSI model
To establish a TCP session
Logic bomb
Some Pen Test techniques
31. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
The four types of events reported by IDS
Arbitrary substitution
Deep packet inspection
EXE program infector
32. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Types of viruses
The protected enclave to defense in depth
Address Resolution Protocol (ARP)
Some reasons to use TCP over UDP
33. Personal area network - phone tethering - bluetooth - etc
Types of viruses
PAN
ATM work
Proxy or application gateway
34. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Some disadvantages of honeypots
The transport layer
SQL Slammer Worm
Kismet
35. Intrusion detection system - it reports attacks against monitored systems/networks
IDS
The different cable categories
Some external threat concerns
Smurf attack
36. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
To establish a TCP session
ATM work
No State Inspection ACK flag set
A network protocol
37. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Some network design objectives
PAN
SYN flood
The CIA triad
38. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
Risk
Alteration of code
Some reasons to use UDP over TCP
A netmask
39. Going around with equipment to detect wireless networks
The Information Centric defense in depth
ATM work
Wardriving
Parasitic malware
40. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Social engineering
Address Resolution Protocol (ARP)
UDP packet headers
The OSI Protocol Stack
41. A cracking tool inserted into the OS that allows the attacker to do as they please.
Browsing attack
Some common TCP ports
Network stumbler
Rootkit
42. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
When implementing protocols - what stack should be used?
What range is a class B network?
Hping
Ciphertext
43. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
The five threat vectors
Some malware capabilities
Some reasons to use UDP over TCP
Internet
44. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
The conficker worm
NIDS advantages
Some reasons to use UDP over TCP
Stateless packet filter
45. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
IDS data normalization
What range is a class C network?
Bridge
When setting up a virtual circuit
46. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Shallow packet inspection
Proxy or application gateway
Bridge
Smurf attack
47. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
ACK piggybacking
Anomaly analysis work
The transport layer
Shallow packet inspection
48. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
OS Command Injection defenses
Some reasons to use UDP over TCP
Remote maintenance
Smurf attack
49. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Hubs
What threats should be protected against - based on threat levels
SQL Slammer Worm
What range is a class C network?
50. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Network stumbler
Some reasons to use TCP over UDP
Some network design objectives
The TCP/IP model
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests