SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Router
When implementing protocols - what stack should be used?
Datagram length of a UDP packet
Vulnerabilities
2. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Honeyd
A blind FTP
Some firewall challenges
Some FTP dangers
3. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
A netmask
Some Pen Test techniques
Ack Piggybacking
What range is a class C network?
4. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Alteration of code
Some external threat concerns
Defense in depth
Arbitrary substitution
5. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Stateless packet filter
The conficker worm
A netmask
Some firewall challenges
6. Trying to ID modems in a telephone exchange that may be susceptible to compromise
NIDS advantages
Some external threat concerns
War Dialing
CIDR
7. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
What's a VLAN
Some disadvantages of honeypots
SYN flood
Stateful firewall
8. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
TFTP
Defense in depth
File integrity checking work
Address resolution protocol
9. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
The OSI Protocol Stack
Firewall
The physical layer stack
COM/Script program infector
10. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Brute force
MAN
To establish a TCP session
The goals of cryptography
11. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
What range is a class A network?
Hubs
Types of ATM virtual circuits
The conficker worm
12. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Some common UDP ports
Anomaly analysis work
When implementing protocols - what stack should be used?
HIDS monitor
13. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
Deep packet inspection
Address resolution protocol
NAC
A blind FTP
14. Protected at rest - protected in transit - secure the key
Rotation?
Trojan horse
What ways should the crypto key be protected?
Checksum in UDP
15. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
CIDR
What range is a class A network?
Remote maintenance
A netmask
16. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Types of viruses
Social engineering
Stateful firewall
Firewall
17. Full open - half open (stealth scan) - UDP - Ping
COM/Script program infector
EXE program infector
What range is a class C network?
Nmap scanning techniques
18. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Alteration of code
Nmap scanning techniques
COM/Script program infector
Boot record infector
19. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Group
Rotation?
Some reasons to use UDP over TCP
Shallow packet inspection
20. Attaches itself to existing program files and activated when the exe is launched
IDS
Program infector
Some Pen Test techniques
Datagram length of a UDP packet
21. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Honeyd
The transport layer
Overview of TCP
The OSI Protocol Stack
22. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Port scan
Total cell size for asynchronous transfer mode (ATM)
File integrity checking work
Firewall
23. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
ACK piggybacking
ATM work
CIDR
Router
24. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
UDP packet headers
Trojan horse
The data link layer
Multi protocol label switching
25. Unencrypted message in its original form
Some firewall benefits
3-way handshake
Plaintext
MAN
26. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Defense in depth
Kismet
Macro virus
Types of viruses
27. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
When implementing protocols - what stack should be used?
NIDS advantages
What range is a class C network?
What categories do vulnerabilities fall into?
28. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
IDS data normalization
Stateless packet filter
Snort
A netmask
29. Personal area network - phone tethering - bluetooth - etc
Some ways to bypass firewall protections
Some other UDP based protocols
PAN
Hping
30. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
A netcat listener
Bridge
Proxy or application gateway
IDS
31. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
Some external threat concerns
Macro virus
the application layer
32. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
The network layer
Hubs
Overview of TCP
IDS signature analysis work
33. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Wardriving
ACK piggybacking
The Information Centric defense in depth
A network protocol
34. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Address Resolution Protocol (ARP)
Stateless packet filter
CIDR
Types of viruses
35. The practice of sending an ACK inside another packet going to the same destination
The goals of cryptography
Address resolution protocol
ACK piggybacking
Multi protocol label switching
36. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
No State Inspection ACK flag set
Nmap
Shallow packet inspection
What range is a class A network?
37. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
The four basic approaches to defense in depth
A netcat listener
Overview of TCP
What's a VLAN
38. Stateful firewalls maintain state of traffic flows
The Information Centric defense in depth
Trap door
The data link layer
Stateful firewall
39. Syn - Syn/Ack - Ack
Some disadvantages of honeypots
What threats should be protected against - based on threat levels
To establish a TCP session
Trap door
40. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Alteration of code
Denial of service
SYN flood
Some FTP dangers
41. Considered to be a perimeter device
Rotation?
When setting up a virtual circuit
Social engineering
Router
42. It handles the establishment and maintenance of connections between systems
The five threat vectors
Some FTP dangers
To establish a TCP session
The session layer
43. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
Boot record infector
Some malware capabilities
LAN
Some NIDS topology limitations
44. Going around with equipment to detect wireless networks
Social engineering
When setting up a virtual circuit
DDoS attack
Wardriving
45. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
The OSI model
Overview of TCP
Arbitrary substitution
Some Pen Test techniques
46. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
The network layer
A netcat listener
CIDR
IDS not
47. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
IDS signature analysis work
Some common UDP ports
SQL Slammer Worm
The difference in stacks
48. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
NIDS challenges
Honeypot
Datagram length of a UDP packet
SYN flood
49. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Stateless packet filter
Plaintext
What primary threats should be protected against
Honeypot
50. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Types of viruses
Firewall
The four types of events reported by IDS
No State Inspection ACK flag set
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests