SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Social engineering
Some reasons to use TCP over UDP
Group
To establish a TCP session
2. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
The conficker worm
The five threat vectors
What range is a class A network?
Some common TCP ports
3. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Switches
A blind FTP
IDS signature analysis work
The four types of events reported by IDS
4. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Switches
The transport layer
A network protocol
Some NIDS topology limitations
5. It interacts with the application layer to determine which network services will be required
What range is a class A network?
The TCP/IP model
Some firewall challenges
the application layer
6. Unencrypted message in its original form
Some malware capabilities
The session layer
Plaintext
Macro virus
7. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
Hubs
Some disadvantages of honeypots
The different cable categories
The physical layer stack
8. logic bomb - trojan horse - trap door
Nmap scanning techniques
Macro virus
UDP packet headers
Some types of malicious code
9. Malware - insider threat - natural disaster - terrorism - pandemic
Hping
SYN flood
IDS data normalization
What primary threats should be protected against
10. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
File integrity checking work
The presentation layer
No State Inspection ACK flag set
Rotation?
11. Bits of code embedded in programs to quickly gain access at a later time
Trap door
War Dialing
Some honeypot advantages
Checksum in UDP
12. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Risk
Bridge
Bus Topology
What's a VLAN
13. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Some malware propagation techniques
CIDR
Trojan horse
The five threat vectors
14. Handles transmissions across the physical media like wires - fiber - etc
The physical layer stack
A netcat listener
Race conditions
To establish a TCP session
15. Considered to be a perimeter device
ACK piggybacking
Total cell size for asynchronous transfer mode (ATM)
Trap door
Router
16. Protected at rest - protected in transit - secure the key
Asynchronous Transfer Mode
Bridge
File integrity checking work
What ways should the crypto key be protected?
17. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Best way to protect wireless networks
Some firewall benefits
Worms
Stateless packet filter
18. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
Race conditions
The five threat vectors
Some other UDP based protocols
EXE program infector
19. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
What primary threats should be protected against
Risk
When setting up a virtual circuit
The three goals of security
20. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
What range is a class C network?
A netmask
Plaintext
What range is a class B network?
21. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Hubs
Asynchronous Transfer Mode
When implementing protocols - what stack should be used?
The four types of events reported by IDS
22. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
The physical layer stack
The OSI Protocol Stack
The four basic approaches to defense in depth
Snort
23. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
HIDS monitor
Total cell size for asynchronous transfer mode (ATM)
Multi protocol label switching
The physical layer stack
24. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Address Resolution Protocol (ARP)
DDoS attack
The Uniform Protection to defense in depth
Macro virus
25. Stateful firewalls maintain state of traffic flows
Asynchronous Transfer Mode
Bridge
WAN
Stateful firewall
26. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
The conficker worm
File integrity checking work
The five threat vectors
When talking about protocols and referencing layers - what stack is used
27. FIN 130 - ACK 131 - FIN 570 - ACK 571
To close a TCP session
Anomaly analysis work
The OSI Protocol Stack
IDS data normalization
28. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Anomaly analysis work
The TCP/IP model
Stateless packet filter
File Integrity checking work
29. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Logic bomb
Permutation
Trap door
File Integrity checking work
30. Personal area network - phone tethering - bluetooth - etc
File integrity checking work
Some types of malicious code
Plaintext
PAN
31. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
The four basic approaches to defense in depth
Worms
Ack Piggybacking
CIDR
32. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
SQL Slammer Worm
The Uniform Protection to defense in depth
A netmask
LAN
33. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
HIDS monitor
Ciphertext
File integrity checking work
A network protocol
34. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
COM/Script program infector
What ways should the crypto key be protected?
A blind FTP
The OSI model
35. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
File Integrity checking work
Hubs
Address resolution protocol
36. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Some malware propagation techniques
Stateful firewall
NIDS advantages
Brute force
37. Relies on executable code insertion and user interaction to spread
The difference in stacks
Parasitic malware
Macro virus
WAN
38. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Bridge
Arbitrary substitution
The Uniform Protection to defense in depth
Types of ATM virtual circuits
39. Provides insight into the tactics - motives - and attacker tools
Some honeypot advantages
The OSI Protocol Stack
Some Pen Test techniques
IDS
40. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Some network design objectives
Kismet
NIDS advantages
Best way to protect wireless networks
41. An attempt to gain access by bombarding it with guesses until the password is found.
Hping
Overview of TCP
Brute force
Stateless packet filter
42. Intellectual property - business goals - validated data - historical
Log monitoring work?
What threats should be protected against - based on threat levels
Rotation?
When setting up a virtual circuit
43. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
Trap door
The data link layer
A netmask
Parasitic malware
44. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
Some disadvantages of honeypots
Logic bomb
Some firewall benefits
The network layer
45. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
SQL Slammer Worm
File Integrity checking work
Types of ATM virtual circuits
LAN
46. Message in its encrypted form
Ciphertext
Remote maintenance
IDS not
Wardriving
47. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
The five threat vectors
Program infector
Multi protocol label switching
Proxy or application gateway
48. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Macro virus
DDoS attack
Browsing attack
Some NIDS topology limitations
49. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Smurf attack
Some malware capabilities
Ciphertext
Some reasons to use TCP over UDP
50. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
Honeypot
Checksum in UDP
File Integrity checking work
NAC