SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A cracking tool inserted into the OS that allows the attacker to do as they please.
Worms
Best way to protect wireless networks
The goals of cryptography
Rootkit
2. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
The conficker worm
Nmap
What primary threats should be protected against
Some other UDP based protocols
3. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
Shallow packet inspection
Plaintext
A netcat listener
3-way handshake
4. Stateful firewalls maintain state of traffic flows
Bus Topology
MAN
Stateful firewall
A netmask
5. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Types of ATM virtual circuits
Some FTP dangers
Some network design objectives
Nmap scanning techniques
6. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
The Uniform Protection to defense in depth
Address resolution protocol
Stateful firewall
Hping
7. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Log monitoring work?
The network layer
Integrity of Data
the application layer
8. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Boot record infector
To close a TCP session
Log monitoring work?
The Uniform Protection to defense in depth
9. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Remote maintenance
What range is a class A network?
The presentation layer
Some malware propagation techniques
10. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
Address resolution protocol
WAN
COM/Script program infector
Some NIDS topology limitations
11. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Some malware capabilities
EXE program infector
When setting up a virtual circuit
IDS not
12. Considered to be a perimeter device
What's an easy way to test encryption?
Some NIDS topology limitations
Router
The Information Centric defense in depth
13. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
The difference in stacks
Types of viruses
What's a VLAN
14. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
When setting up a virtual circuit
To close a TCP session
The conficker worm
OS Command Injection defenses
15. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
HIDS monitor
When setting up a virtual circuit
Router
Some firewall challenges
16. It handles the establishment and maintenance of connections between systems
The session layer
Types of viruses
Logic bomb
A netmask
17. Bits of code embedded in programs to quickly gain access at a later time
Trap door
Proxy or application gateway
Overview of TCP
UDP packet headers
18. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
File integrity checking work
When implementing protocols - what stack should be used?
Group
NIDS advantages
19. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
What primary threats should be protected against
A netcat listener
CIDR
When setting up a virtual circuit
20. Syn - Syn/Ack - Ack
Alteration of code
Ack Piggybacking
To establish a TCP session
The conficker worm
21. Provides insight into the tactics - motives - and attacker tools
Some honeypot advantages
Some NIDS topology limitations
IDS not
What's an easy way to test encryption?
22. Unified data carrying service - replacing from replay and ATM
Multi protocol label switching
Datagram length of a UDP packet
Permutation
When setting up a virtual circuit
23. Confidentiality - integrity - availability
The CIA triad
No State Inspection ACK flag set
What primary threats should be protected against
What range is a class A network?
24. Trying to ID modems in a telephone exchange that may be susceptible to compromise
War Dialing
Firewall
Some common TCP ports
UDP packet headers
25. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
EXE program infector
SQL Slammer Worm
SYN flood
Parasitic malware
26. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Some common UDP ports
Switches
Some firewall challenges
Some honeypot advantages
27. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
What threats should be protected against - based on threat levels
Some honeypot advantages
LAN
What range is a class C network?
28. Known - unknown - zero day
Some firewall benefits
What categories do vulnerabilities fall into?
What primary threats should be protected against
Trojan horse
29. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Parasitic malware
What's a VLAN
The presentation layer
Types of ATM virtual circuits
30. Confidentiality - symmetric encryption
The goals of cryptography
LAN
Anomaly analysis work
Defense in depth
31. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
A blind FTP
Port scan
The data link layer
IDS data normalization
33. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Stateful firewall
Address resolution protocol
Wardriving
Honeypot
34. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
COM/Script program infector
What range is a class A network?
Bridge
What range is a class B network?
35. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
The OSI model
Ciphertext
Some other UDP based protocols
Alteration of code
36. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Arbitrary substitution
Shallow packet inspection
Alteration of code
A netcat listener
37. Uniform protection - protected enclaves - information centric - threat vector analysis
The four basic approaches to defense in depth
When setting up a virtual circuit
Some disadvantages of honeypots
Some FTP dangers
38. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
The session layer
MAN
Vulnerabilities
Best way to protect wireless networks
39. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
The transport layer
Hubs
The physical layer stack
The OSI model
40. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Nmap
What's an easy way to test encryption?
Race conditions
Denial of service
41. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
Buffer overflow
The data link layer
Some ways to bypass firewall protections
Rootkit
42. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Some common TCP ports
LAN
To close a TCP session
DDoS attack
43. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
The OSI model
What's a VLAN
Some other UDP based protocols
Integrity of Data
44. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
The five threat vectors
Log monitoring work?
Hubs
MAN
45. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Some malware capabilities
When implementing protocols - what stack should be used?
The protected enclave to defense in depth
Some disadvantages of honeypots
46. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The TCP/IP model
Plaintext
LAN
Remote maintenance
47. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Risk
NIDS challenges
The three goals of security
What range is a class A network?
48. Full open - half open (stealth scan) - UDP - Ping
Nmap scanning techniques
ATM work
The goals of cryptography
The CIA triad
49. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
The OSI Protocol Stack
Some external threat concerns
Plaintext
NIDS advantages
50. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Deep packet inspection
Port scan
Honeypot
File Integrity checking work