SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
When setting up a virtual circuit
Address Resolution Protocol (ARP)
What categories do vulnerabilities fall into?
Honeypot
2. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
NAC
Datagram length of a UDP packet
Trojan horse
Some Pen Test techniques
3. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some firewall challenges
SYN flood
Logic bomb
A netcat listener
4. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
Parasitic malware
The conficker worm
File Integrity checking work
ACK piggybacking
5. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
NIDS challenges
Some FTP dangers
What range is a class B network?
No State Inspection ACK flag set
6. Known - unknown - zero day
Nmap
HIDS monitor
What categories do vulnerabilities fall into?
Trap door
7. Infects MBR - no network spreading potential
The OSI Protocol Stack
The protected enclave to defense in depth
Boot record infector
Datagram length of a UDP packet
8. logic bomb - trojan horse - trap door
To establish a TCP session
Some types of malicious code
Checksum in UDP
Brute force
9. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
When implementing protocols - what stack should be used?
Switches
Hubs
NAC
10. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Some common TCP ports
Remote maintenance
Macro virus
The three goals of security
11. Confidentiality - integrity - availability
Plaintext
Some firewall challenges
Address Resolution Protocol (ARP)
The three goals of security
12. It handles the establishment and maintenance of connections between systems
ACK piggybacking
The session layer
Bridge
Address resolution protocol
13. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Snort
Some malware capabilities
Macro virus
3-way handshake
14. Connects many WANs - MANs - and LANs - provided via ISP
Shallow packet inspection
Checksum in UDP
Internet
Router
15. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Total cell size for asynchronous transfer mode (ATM)
Permutation
Rotation?
Defense in depth
16. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
The transport layer
CIDR
File Integrity checking work
Anomaly analysis work
17. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
OS Command Injection defenses
Rotation?
Risk
Types of viruses
18. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some NIDS topology limitations
NIDS advantages
Some reasons to use UDP over TCP
MAN
19. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Some firewall benefits
ACK piggybacking
A network protocol
Types of ATM virtual circuits
20. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
NAC
When talking about protocols and referencing layers - what stack is used
Some malware propagation techniques
21. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
When implementing protocols - what stack should be used?
Defense in depth
Some disadvantages of honeypots
Best way to protect wireless networks
22. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
What range is a class B network?
Ack Piggybacking
A blind FTP
The four types of events reported by IDS
23. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Parasitic malware
Bus Topology
Port scan
What range is a class C network?
24. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS data normalization
Some honeypot advantages
Rootkit
The protected enclave to defense in depth
25. It makes sure the data sent from one side to the other is in a format useful to the other side
The protected enclave to defense in depth
The different cable categories
The presentation layer
War Dialing
26. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
File integrity checking work
What's a VLAN
Some types of malicious code
IDS not
27. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
Boot record infector
The OSI Protocol Stack
The different cable categories
Switches
28. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
NAC
The conficker worm
Denial of service
Some ways to bypass firewall protections
29. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
The CIA triad
What primary threats should be protected against
What range is a class A network?
What threats should be protected against - based on threat levels
30. Bits of code embedded in programs to quickly gain access at a later time
Stateful firewall
Browsing attack
Trap door
To establish a TCP session
31. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Asynchronous Transfer Mode
Stateless packet filter
Some firewall benefits
Permutation
32. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Permutation
EXE program infector
Remote maintenance
Some ways to bypass firewall protections
33. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Stateful firewall
The OSI Protocol Stack
Checksum in UDP
Brute force
34. Protected at rest - protected in transit - secure the key
LAN
Hping
NIDS advantages
What ways should the crypto key be protected?
35. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
ATM work
Some common UDP ports
What's a VLAN
Some common TCP ports
36. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
What ways should the crypto key be protected?
DDoS attack
What range is a class C network?
Some malware propagation techniques
37. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Permutation
The physical layer stack
Address Resolution Protocol (ARP)
Some types of malicious code
38. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some other UDP based protocols
TFTP
No State Inspection ACK flag set
Some common UDP ports
39. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Social engineering
The Uniform Protection to defense in depth
Vulnerabilities
To establish a TCP session
40. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
The different cable categories
OS Command Injection defenses
What's an easy way to test encryption?
War Dialing
41. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
To close a TCP session
Log monitoring work?
Some common TCP ports
The difference in stacks
42. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
Some malware propagation techniques
The data link layer
Trojan horse
File integrity checking work
43. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Some types of malicious code
The OSI model
File integrity checking work
SQL Slammer Worm
44. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
Address Resolution Protocol (ARP)
IDS signature analysis work
Bus Topology
Anomaly analysis work
45. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Denial of service
Rootkit
WAN
Boot record infector
46. Personal area network - phone tethering - bluetooth - etc
PAN
Some external threat concerns
Risk
Deep packet inspection
47. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
IDS signature analysis work
Honeypot
Wardriving
Some malware propagation techniques
48. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Multi protocol label switching
Network stumbler
Some Pen Test techniques
Nmap scanning techniques
49. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
What range is a class C network?
Stateful firewall
Some network design objectives
LAN
50. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
Boot record infector
Some types of malicious code
Rotation?
When setting up a virtual circuit