SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
No State Inspection ACK flag set
The CIA triad
Hubs
Some network design objectives
3. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The transport layer
Proxy or application gateway
Some external threat concerns
the application layer
4. A cracking tool inserted into the OS that allows the attacker to do as they please.
Nmap scanning techniques
ACK piggybacking
Rootkit
To close a TCP session
5. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Proxy or application gateway
Race conditions
Network stumbler
Anomaly analysis work
6. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
Nmap scanning techniques
Some external threat concerns
A network protocol
HIDS monitor
7. Stateful firewalls maintain state of traffic flows
Asynchronous Transfer Mode
Stateful firewall
MAN
IDS data normalization
8. Personal area network - phone tethering - bluetooth - etc
LAN
PAN
Types of ATM virtual circuits
Social engineering
9. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Ack Piggybacking
Permutation
Log monitoring work?
Worms
10. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
LAN
Checksum in UDP
Some firewall challenges
Snort
11. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
When implementing protocols - what stack should be used?
IDS signature analysis work
Stateful firewall
War Dialing
12. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Smurf attack
Hping
Ack Piggybacking
Risk
13. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Types of viruses
No State Inspection ACK flag set
What's a VLAN
IDS
14. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Rotation?
Some common UDP ports
Some firewall benefits
The goals of cryptography
15. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
What range is a class C network?
Vulnerabilities
The threat vector analysis in defense in depth
Smurf attack
16. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
SYN flood
CIDR
Browsing attack
COM/Script program infector
17. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Some reasons to use TCP over UDP
NIDS challenges
The protected enclave to defense in depth
The Uniform Protection to defense in depth
18. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
UDP packet headers
Social engineering
SQL Slammer Worm
Multi protocol label switching
19. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
Address Resolution Protocol (ARP)
EXE program infector
A netmask
Rootkit
20. logic bomb - trojan horse - trap door
Internet
Some types of malicious code
3-way handshake
The Information Centric defense in depth
21. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
IDS not
The physical layer stack
The TCP/IP model
Social engineering
22. Confidentiality - symmetric encryption
The difference in stacks
Some honeypot advantages
The goals of cryptography
The transport layer
23. Protected at rest - protected in transit - secure the key
PAN
What ways should the crypto key be protected?
Nmap scanning techniques
NIDS advantages
24. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
Bus Topology
What range is a class A network?
The network layer
Hubs
25. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
IDS signature analysis work
Some ways to bypass firewall protections
NIDS advantages
No State Inspection ACK flag set
26. FIN 130 - ACK 131 - FIN 570 - ACK 571
To close a TCP session
Honeypot
Overview of TCP
LAN
27. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
Checksum in UDP
The OSI Protocol Stack
Hubs
The conficker worm
28. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
Buffer overflow
IDS not
OS Command Injection defenses
Firewall
29. Malware - insider threat - natural disaster - terrorism - pandemic
File Integrity checking work
Stateful firewall
What primary threats should be protected against
Best way to protect wireless networks
30. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
When setting up a virtual circuit
Stateful firewall
Social engineering
ATM work
31. An attempt to gain access by bombarding it with guesses until the password is found.
CIDR
WAN
Worms
Brute force
32. True positive - false positive - true negative - false negative
The TCP/IP model
A netmask
The four types of events reported by IDS
Bridge
33. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
The data link layer
EXE program infector
What threats should be protected against - based on threat levels
The OSI model
34. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
What range is a class A network?
COM/Script program infector
A network protocol
Some reasons to use TCP over UDP
35. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
What range is a class C network?
What ways should the crypto key be protected?
Some Pen Test techniques
What categories do vulnerabilities fall into?
36. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Switches
Defense in depth
Remote maintenance
Types of viruses
37. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
When implementing protocols - what stack should be used?
DDoS attack
Deep packet inspection
Logic bomb
38. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Bus Topology
A network protocol
Address Resolution Protocol (ARP)
PAN
39. The Practice of sending an ACK inside another packet going to the same destination
TFTP
Group
Risk
Ack Piggybacking
40. Message in its encrypted form
A network protocol
To close a TCP session
Ciphertext
NIDS challenges
41. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Plaintext
The protected enclave to defense in depth
The five threat vectors
Multi protocol label switching
42. Going around with equipment to detect wireless networks
Denial of service
The goals of cryptography
Firewall
Wardriving
43. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Some reasons to use UDP over TCP
Arbitrary substitution
NAC
the application layer
44. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Checksum in UDP
DDoS attack
The four types of events reported by IDS
Some reasons to use UDP over TCP
45. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Parasitic malware
Network stumbler
A netmask
Address Resolution Protocol (ARP)
46. Uniform protection - protected enclaves - information centric - threat vector analysis
NIDS advantages
IDS data normalization
The four basic approaches to defense in depth
WAN
47. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Anomaly analysis work
Bridge
Parasitic malware
Defense in depth
48. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Arbitrary substitution
Overview of TCP
Group
Address Resolution Protocol (ARP)
49. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
NIDS advantages
Logic bomb
Some reasons to use UDP over TCP
The difference in stacks
50. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
SQL Slammer Worm
Some external threat concerns
CIDR
Some other UDP based protocols