SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
NIDS advantages
Some reasons to use TCP over UDP
Multi protocol label switching
ACK piggybacking
2. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Integrity of Data
Honeypot
Social engineering
Some honeypot advantages
3. destruction of data - leaking confidential information - providing backdoor access
Ciphertext
Internet
Some malware capabilities
The Uniform Protection to defense in depth
4. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Some FTP dangers
Datagram length of a UDP packet
Ack Piggybacking
NIDS challenges
5. Confidentiality - integrity - availability
The CIA triad
CIDR
Honeyd
What primary threats should be protected against
6. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
The OSI Protocol Stack
Defense in depth
Smurf attack
Kismet
7. Attaches itself to existing program files and activated when the exe is launched
Program infector
Checksum in UDP
To close a TCP session
NIDS advantages
8. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
When setting up a virtual circuit
The five threat vectors
Router
ATM work
9. Confidentiality - integrity - availability
Bus Topology
The transport layer
COM/Script program infector
The three goals of security
10. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
PAN
Stateless packet filter
The network layer
The difference in stacks
11. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Hping
What range is a class A network?
Switches
Asynchronous Transfer Mode
12. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Brute force
Some common UDP ports
Macro virus
UDP packet headers
13. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
The transport layer
Hubs
Some ways to bypass firewall protections
Some disadvantages of honeypots
14. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
Deep packet inspection
The conficker worm
Integrity of Data
Port scan
15. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
EXE program infector
The difference in stacks
When setting up a virtual circuit
Asynchronous Transfer Mode
16. Network scanner.
HIDS monitor
Plaintext
Nmap
Arbitrary substitution
17. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Snort
Wardriving
SYN flood
Alteration of code
18. An attempt to gain access by bombarding it with guesses until the password is found.
Brute force
No State Inspection ACK flag set
A netcat listener
To close a TCP session
19. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Ciphertext
When setting up a virtual circuit
Hubs
The different cable categories
20. Provides insight into the tactics - motives - and attacker tools
Datagram length of a UDP packet
A netmask
Some honeypot advantages
Kismet
21. Unencrypted message in its original form
Buffer overflow
Plaintext
EXE program infector
The physical layer stack
22. The practice of sending an ACK inside another packet going to the same destination
Smurf attack
ACK piggybacking
WAN
Macro virus
23. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Vulnerabilities
the application layer
Race conditions
The physical layer stack
24. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Network stumbler
A netmask
Anomaly analysis work
Some malware capabilities
25. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Risk
IDS not
A network protocol
Total cell size for asynchronous transfer mode (ATM)
26. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Alteration of code
What threats should be protected against - based on threat levels
Some NIDS topology limitations
Nmap scanning techniques
27. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
The OSI Protocol Stack
A network protocol
Firewall
The OSI model
28. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Bridge
Internet
Arbitrary substitution
Trojan horse
29. Uniform protection - protected enclaves - information centric - threat vector analysis
The four types of events reported by IDS
Nmap
The four basic approaches to defense in depth
Firewall
30. Infects MBR - no network spreading potential
Boot record infector
DDoS attack
The transport layer
Address Resolution Protocol (ARP)
31. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
ATM work
Some firewall challenges
MAN
the application layer
32. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
The data link layer
A blind FTP
Hping
Vulnerabilities
33. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Plaintext
Some ways to bypass firewall protections
When implementing protocols - what stack should be used?
Hping
34. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
The five threat vectors
OS Command Injection defenses
What's a VLAN
NAC
35. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
The physical layer stack
Worms
The CIA triad
File integrity checking work
36. OSI
Trojan horse
SYN flood
When talking about protocols and referencing layers - what stack is used
Nmap
37. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Denial of service
Brute force
The transport layer
SQL Slammer Worm
38. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
DDoS attack
Denial of service
To establish a TCP session
Hping
39. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
3-way handshake
EXE program infector
The session layer
UDP packet headers
40. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
Some honeypot advantages
The five threat vectors
SYN flood
The session layer
41. True positive - false positive - true negative - false negative
The four types of events reported by IDS
Integrity of Data
Snort
Some reasons to use TCP over UDP
42. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
No State Inspection ACK flag set
3-way handshake
Denial of service
NIDS advantages
43. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Log monitoring work?
What range is a class A network?
PAN
What range is a class B network?
44. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. Stateful firewalls maintain state of traffic flows
TFTP
To establish a TCP session
Stateful firewall
Some FTP dangers
46. It makes sure the data sent from one side to the other is in a format useful to the other side
What range is a class B network?
Checksum in UDP
TFTP
The presentation layer
47. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Multi protocol label switching
Social engineering
Trojan horse
ACK piggybacking
48. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Social engineering
NAC
Some malware propagation techniques
Hping
49. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
The five threat vectors
IDS signature analysis work
Logic bomb
Types of ATM virtual circuits
50. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183