SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
A netmask
Total cell size for asynchronous transfer mode (ATM)
Some reasons to use UDP over TCP
Multi protocol label switching
2. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Rotation?
Arbitrary substitution
UDP packet headers
Datagram length of a UDP packet
3. Attaches itself to existing program files and activated when the exe is launched
When implementing protocols - what stack should be used?
Bridge
Program infector
The Uniform Protection to defense in depth
4. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Logic bomb
Hubs
WAN
Vulnerabilities
5. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Types of ATM virtual circuits
LAN
Checksum in UDP
ACK piggybacking
6. One is for talking - one is for implementing
Shallow packet inspection
OS Command Injection defenses
Hubs
The difference in stacks
7. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
When setting up a virtual circuit
No State Inspection ACK flag set
Best way to protect wireless networks
Router
8. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
Honeyd
SQL Slammer Worm
Proxy or application gateway
Stateful firewall
9. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
The different cable categories
Buffer overflow
Some FTP dangers
Risk
10. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
CIDR
The presentation layer
Best way to protect wireless networks
Some NIDS topology limitations
11. True positive - false positive - true negative - false negative
Trojan horse
3-way handshake
Honeyd
The four types of events reported by IDS
12. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Kismet
IDS signature analysis work
Some reasons to use TCP over UDP
ATM work
13. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
The OSI Protocol Stack
A blind FTP
What range is a class B network?
NAC
14. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Logic bomb
3-way handshake
MAN
Best way to protect wireless networks
15. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Some other UDP based protocols
Hubs
Some common TCP ports
OS Command Injection defenses
16. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Trap door
Address resolution protocol
Multi protocol label switching
Some firewall challenges
17. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
Some reasons to use TCP over UDP
Checksum in UDP
Overview of TCP
ATM work
18. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
The conficker worm
Firewall
EXE program infector
Arbitrary substitution
19. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
IDS not
Social engineering
Overview of TCP
Nmap
20. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Address Resolution Protocol (ARP)
3-way handshake
Arbitrary substitution
Switches
21. Unified data carrying service - replacing from replay and ATM
War Dialing
Alteration of code
Multi protocol label switching
Smurf attack
22. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
What range is a class A network?
What categories do vulnerabilities fall into?
Plaintext
Anomaly analysis work
23. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
What range is a class A network?
The protected enclave to defense in depth
Address resolution protocol
The physical layer stack
24. Unencrypted message in its original form
Worms
Log monitoring work?
Plaintext
Port scan
25. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bridge
No State Inspection ACK flag set
Bus Topology
Permutation
26. Going around with equipment to detect wireless networks
A netcat listener
Hping
IDS
Wardriving
27. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Hubs
The four types of events reported by IDS
Types of viruses
Asynchronous Transfer Mode
28. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Switches
No State Inspection ACK flag set
Overview of TCP
The Information Centric defense in depth
29. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Proxy or application gateway
3-way handshake
DDoS attack
When setting up a virtual circuit
30. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
Proxy or application gateway
File Integrity checking work
A network protocol
Plaintext
31. OSI
Some FTP dangers
The five threat vectors
When talking about protocols and referencing layers - what stack is used
The presentation layer
32. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Worms
MAN
Some NIDS topology limitations
Some firewall benefits
33. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Trap door
Address Resolution Protocol (ARP)
Some network design objectives
To establish a TCP session
34. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Total cell size for asynchronous transfer mode (ATM)
Address resolution protocol
Types of ATM virtual circuits
The Uniform Protection to defense in depth
35. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Browsing attack
Some external threat concerns
Best way to protect wireless networks
Some common TCP ports
36. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
A netcat listener
LAN
Types of viruses
The Uniform Protection to defense in depth
37. Malware - insider threat - natural disaster - terrorism - pandemic
Program infector
The CIA triad
What ways should the crypto key be protected?
What primary threats should be protected against
38. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Some ways to bypass firewall protections
Some other UDP based protocols
NIDS advantages
The difference in stacks
39. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Log monitoring work?
Checksum in UDP
Bus Topology
The OSI model
40. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Some Pen Test techniques
Worms
The physical layer stack
The CIA triad
41. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Some firewall challenges
Vulnerabilities
A blind FTP
Integrity of Data
42. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Types of viruses
Honeyd
The Information Centric defense in depth
Some FTP dangers
43. logic bomb - trojan horse - trap door
The difference in stacks
Some types of malicious code
DDoS attack
IDS signature analysis work
44. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Some types of malicious code
What range is a class A network?
Stateful firewall
Shallow packet inspection
45. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
HIDS monitor
Some network design objectives
Port scan
Wardriving
46. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
ATM work
Datagram length of a UDP packet
The OSI model
Network stumbler
47. An attempt to gain access by bombarding it with guesses until the password is found.
What range is a class B network?
Port scan
The physical layer stack
Brute force
48. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Shallow packet inspection
Multi protocol label switching
Best way to protect wireless networks
Some ways to bypass firewall protections
49. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Port scan
No State Inspection ACK flag set
Hubs
Some firewall benefits
50. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Firewall
A netcat listener
Permutation
Types of ATM virtual circuits
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests