SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Plaintext
Types of viruses
Router
Overview of TCP
2. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
When implementing protocols - what stack should be used?
IDS signature analysis work
The network layer
Port scan
4. Network scanner.
ATM work
Some ways to bypass firewall protections
Nmap
Some other UDP based protocols
5. It interacts with the application layer to determine which network services will be required
OS Command Injection defenses
the application layer
Shallow packet inspection
Trap door
6. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. destruction of data - leaking confidential information - providing backdoor access
Permutation
Some malware capabilities
Log monitoring work?
The four basic approaches to defense in depth
8. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
What's a VLAN
The data link layer
The different cable categories
Some firewall benefits
9. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Best way to protect wireless networks
Deep packet inspection
Address Resolution Protocol (ARP)
What categories do vulnerabilities fall into?
10. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Network stumbler
Honeypot
IDS not
The OSI model
11. Known - unknown - zero day
Types of viruses
Nmap scanning techniques
What categories do vulnerabilities fall into?
Logic bomb
12. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Stateless packet filter
Arbitrary substitution
Risk
The network layer
13. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
Some malware capabilities
Rotation?
A netmask
Types of viruses
14. Intrusion detection system - it reports attacks against monitored systems/networks
Ciphertext
Overview of TCP
Snort
IDS
15. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Remote maintenance
ATM work
File integrity checking work
The goals of cryptography
16. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
When talking about protocols and referencing layers - what stack is used
Trojan horse
File Integrity checking work
The protected enclave to defense in depth
17. fast - with little fidelity - examines header information and limited payload data
Shallow packet inspection
What range is a class B network?
OS Command Injection defenses
Proxy or application gateway
18. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Router
Rotation?
DDoS attack
What threats should be protected against - based on threat levels
19. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Switches
Integrity of Data
The physical layer stack
Some reasons to use UDP over TCP
20. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
The OSI Protocol Stack
File Integrity checking work
Some Pen Test techniques
What range is a class A network?
21. Syn - Syn/Ack - Ack
To establish a TCP session
Checksum in UDP
Firewall
Some Pen Test techniques
22. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
The Information Centric defense in depth
Social engineering
OS Command Injection defenses
Boot record infector
23. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
The different cable categories
Log monitoring work?
Race conditions
Some honeypot advantages
24. It handles the establishment and maintenance of connections between systems
Nmap scanning techniques
The session layer
Program infector
Nmap
25. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
The presentation layer
What's a VLAN
UDP packet headers
Anomaly analysis work
26. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Some common TCP ports
What range is a class B network?
Anomaly analysis work
Plaintext
27. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
The CIA triad
What's an easy way to test encryption?
Program infector
Types of viruses
28. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
Bus Topology
Best way to protect wireless networks
The network layer
When setting up a virtual circuit
29. Trying to ID modems in a telephone exchange that may be susceptible to compromise
Social engineering
Integrity of Data
War Dialing
A netmask
30. Going around with equipment to detect wireless networks
Nmap scanning techniques
Wardriving
NIDS advantages
Group
31. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
The network layer
Honeyd
NAC
The Uniform Protection to defense in depth
32. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Logic bomb
Defense in depth
What's a VLAN
Alteration of code
33. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Honeypot
A network protocol
Stateless packet filter
Rootkit
34. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
The five threat vectors
NAC
Logic bomb
Asynchronous Transfer Mode
35. Provides insight into the tactics - motives - and attacker tools
Some honeypot advantages
Alteration of code
What ways should the crypto key be protected?
NIDS advantages
36. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
OS Command Injection defenses
Hping
Firewall
NAC
37. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
WAN
The OSI model
Smurf attack
38. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
The OSI Protocol Stack
To close a TCP session
SQL Slammer Worm
IDS not
39. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Datagram length of a UDP packet
Bus Topology
Honeypot
Social engineering
40. One is for talking - one is for implementing
The difference in stacks
The threat vector analysis in defense in depth
Some malware propagation techniques
Internet
41. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
MAN
The presentation layer
Some FTP dangers
Kismet
42. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
Bus Topology
SQL Slammer Worm
What range is a class A network?
File Integrity checking work
43. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
War Dialing
What threats should be protected against - based on threat levels
Trojan horse
Some network design objectives
44. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
The five threat vectors
The goals of cryptography
Some reasons to use UDP over TCP
Some malware propagation techniques
45. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Datagram length of a UDP packet
The different cable categories
Some firewall benefits
The four basic approaches to defense in depth
46. Attaches itself to existing program files and activated when the exe is launched
Stateful firewall
Program infector
PAN
Stateless packet filter
47. Confidentiality - integrity - availability
The difference in stacks
ACK piggybacking
Nmap scanning techniques
The CIA triad
48. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Some ways to bypass firewall protections
WAN
Worms
Some network design objectives
49. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
Some reasons to use TCP over UDP
When setting up a virtual circuit
NIDS advantages
EXE program infector
50. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
To close a TCP session
The Uniform Protection to defense in depth
A network protocol
SYN flood