SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some FTP dangers
Some firewall benefits
Types of ATM virtual circuits
Permutation
2. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Nmap scanning techniques
DDoS attack
WAN
What primary threats should be protected against
3. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
PAN
Port scan
Rootkit
Some ways to bypass firewall protections
4. Intrusion detection system - it reports attacks against monitored systems/networks
Some external threat concerns
Race conditions
Risk
IDS
5. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Some reasons to use UDP over TCP
TFTP
To establish a TCP session
Permutation
6. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
What ways should the crypto key be protected?
Datagram length of a UDP packet
Port scan
Some malware capabilities
7. One is for talking - one is for implementing
The difference in stacks
The goals of cryptography
Some other UDP based protocols
Remote maintenance
8. It handles the establishment and maintenance of connections between systems
Hubs
Race conditions
Bridge
The session layer
9. True positive - false positive - true negative - false negative
COM/Script program infector
Snort
The four types of events reported by IDS
Datagram length of a UDP packet
10. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Some malware propagation techniques
The OSI model
The CIA triad
IDS data normalization
11. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
To close a TCP session
Datagram length of a UDP packet
Honeypot
Kismet
12. Message in its encrypted form
Ciphertext
Logic bomb
When talking about protocols and referencing layers - what stack is used
Integrity of Data
13. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
The protected enclave to defense in depth
What's a VLAN
Buffer overflow
A blind FTP
14. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
Buffer overflow
Port scan
ATM work
The TCP/IP model
15. Provides insight into the tactics - motives - and attacker tools
The CIA triad
Trap door
Some honeypot advantages
The five threat vectors
16. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Proxy or application gateway
COM/Script program infector
Some FTP dangers
When setting up a virtual circuit
17. Intellectual property - business goals - validated data - historical
The CIA triad
Bridge
What threats should be protected against - based on threat levels
Proxy or application gateway
18. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Some honeypot advantages
NIDS challenges
Checksum in UDP
What range is a class B network?
19. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
TFTP
Some Pen Test techniques
What range is a class A network?
the application layer
20. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Logic bomb
The network layer
Defense in depth
Nmap
21. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Bus Topology
The OSI Protocol Stack
COM/Script program infector
Some other UDP based protocols
22. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
Stateful firewall
What range is a class C network?
Snort
IDS data normalization
23. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
Anomaly analysis work
The CIA triad
Trap door
When setting up a virtual circuit
24. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
LAN
Firewall
Denial of service
Some common UDP ports
25. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Vulnerabilities
Kismet
War Dialing
Remote maintenance
26. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
HIDS monitor
Parasitic malware
Types of ATM virtual circuits
Some types of malicious code
27. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
Some common UDP ports
What ways should the crypto key be protected?
The TCP/IP model
28. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
The three goals of security
Network stumbler
What's an easy way to test encryption?
Some reasons to use TCP over UDP
30. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
Boot record infector
Some reasons to use UDP over TCP
Stateful firewall
Port scan
31. logic bomb - trojan horse - trap door
Some types of malicious code
The three goals of security
IDS signature analysis work
Alteration of code
32. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Router
Snort
Some common TCP ports
What primary threats should be protected against
33. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Network stumbler
TFTP
Smurf attack
The Information Centric defense in depth
34. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
Network stumbler
The Uniform Protection to defense in depth
LAN
A blind FTP
35. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
War Dialing
IDS
NAC
Some Pen Test techniques
36. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Bridge
Honeyd
Permutation
Integrity of Data
37. Unified data carrying service - replacing from replay and ATM
Stateless packet filter
Multi protocol label switching
Program infector
Hubs
38. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Anomaly analysis work
The TCP/IP model
Remote maintenance
The goals of cryptography
39. Stateful firewalls maintain state of traffic flows
CIDR
Stateful firewall
The transport layer
Arbitrary substitution
40. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
What range is a class A network?
Port scan
The transport layer
PAN
41. Connects many WANs - MANs - and LANs - provided via ISP
Internet
Address Resolution Protocol (ARP)
IDS signature analysis work
Trojan horse
42. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
Remote maintenance
SYN flood
Overview of TCP
43. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
What's a VLAN
Some other UDP based protocols
Kismet
Overview of TCP
44. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
The difference in stacks
Brute force
What categories do vulnerabilities fall into?
LAN
45. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
The session layer
Logic bomb
Alteration of code
CIDR
46. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Some honeypot advantages
The threat vector analysis in defense in depth
IDS not
When setting up a virtual circuit
47. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
A netcat listener
War Dialing
Some ways to bypass firewall protections
The different cable categories
48. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Group
What ways should the crypto key be protected?
Best way to protect wireless networks
The difference in stacks
49. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Alteration of code
Asynchronous Transfer Mode
The Information Centric defense in depth
IDS
50. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Some FTP dangers
The data link layer
Multi protocol label switching
Internet