SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Handles transmissions across the physical media like wires - fiber - etc
The OSI model
What's a VLAN
LAN
The physical layer stack
2. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Some NIDS topology limitations
TFTP
Brute force
The Information Centric defense in depth
3. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
The data link layer
Checksum in UDP
Some malware propagation techniques
Buffer overflow
4. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
ACK piggybacking
What range is a class A network?
Asynchronous Transfer Mode
Anomaly analysis work
5. The Practice of sending an ACK inside another packet going to the same destination
What ways should the crypto key be protected?
Ack Piggybacking
To establish a TCP session
A netcat listener
6. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Some other UDP based protocols
Hubs
Kismet
Vulnerabilities
7. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
The four basic approaches to defense in depth
Alteration of code
Remote maintenance
The session layer
8. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Race conditions
What range is a class A network?
Types of ATM virtual circuits
Asynchronous Transfer Mode
9. Known - unknown - zero day
The Information Centric defense in depth
Address Resolution Protocol (ARP)
Macro virus
What categories do vulnerabilities fall into?
10. Uniform protection - protected enclaves - information centric - threat vector analysis
The four basic approaches to defense in depth
Some other UDP based protocols
Macro virus
3-way handshake
11. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
IDS not
Switches
Bus Topology
Some external threat concerns
12. It handles the establishment and maintenance of connections between systems
Some malware capabilities
Rootkit
The session layer
Logic bomb
13. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Anomaly analysis work
Boot record infector
Browsing attack
Defense in depth
14. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Some reasons to use UDP over TCP
Shallow packet inspection
Snort
The conficker worm
15. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Permutation
What ways should the crypto key be protected?
Some firewall benefits
SYN flood
16. Network scanner.
Arbitrary substitution
The four types of events reported by IDS
Nmap
File Integrity checking work
17. Confidentiality - symmetric encryption
The goals of cryptography
The protected enclave to defense in depth
Rotation?
3-way handshake
18. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Social engineering
Router
Race conditions
The network layer
19. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Bus Topology
Some malware propagation techniques
ATM work
Kismet
20. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Smurf attack
The protected enclave to defense in depth
Some external threat concerns
The threat vector analysis in defense in depth
21. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
NAC
ATM work
The difference in stacks
COM/Script program infector
22. The practice of sending an ACK inside another packet going to the same destination
The Uniform Protection to defense in depth
ACK piggybacking
What primary threats should be protected against
The data link layer
23. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
The three goals of security
Address resolution protocol
Asynchronous Transfer Mode
The threat vector analysis in defense in depth
24. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Trap door
File integrity checking work
Proxy or application gateway
Total cell size for asynchronous transfer mode (ATM)
25. OSI
When talking about protocols and referencing layers - what stack is used
Snort
Checksum in UDP
Overview of TCP
26. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
HIDS monitor
Some network design objectives
NAC
What's a VLAN
27. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Snort
TFTP
The CIA triad
Browsing attack
28. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Some ways to bypass firewall protections
Nmap scanning techniques
When implementing protocols - what stack should be used?
Some honeypot advantages
29. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Some malware capabilities
The OSI model
Some types of malicious code
The network layer
30. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
A network protocol
Some FTP dangers
Network stumbler
Integrity of Data
31. Connects many WANs - MANs - and LANs - provided via ISP
Network stumbler
Internet
Honeyd
The TCP/IP model
32. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Program infector
Boot record infector
Deep packet inspection
File Integrity checking work
33. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
IDS not
Some other UDP based protocols
MAN
Honeypot
34. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
DDoS attack
A netmask
CIDR
PAN
35. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Address Resolution Protocol (ARP)
File Integrity checking work
Some NIDS topology limitations
Bridge
36. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Alteration of code
NAC
The five threat vectors
IDS
37. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
COM/Script program infector
Race conditions
To close a TCP session
Best way to protect wireless networks
38. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Defense in depth
What categories do vulnerabilities fall into?
Trap door
LAN
39. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
The four types of events reported by IDS
HIDS monitor
Trojan horse
Defense in depth
40. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
What ways should the crypto key be protected?
The conficker worm
Permutation
Bridge
41. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
The CIA triad
IDS data normalization
EXE program infector
Logic bomb
42. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
UDP packet headers
Some FTP dangers
Proxy or application gateway
The presentation layer
43. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
CIDR
Program infector
Some common UDP ports
The TCP/IP model
44. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Rootkit
Worms
Boot record infector
Some external threat concerns
46. Full open - half open (stealth scan) - UDP - Ping
Nmap scanning techniques
War Dialing
Permutation
Some ways to bypass firewall protections
47. Considered to be a perimeter device
Some malware capabilities
Router
Race conditions
Logic bomb
48. True positive - false positive - true negative - false negative
Snort
Rotation?
The CIA triad
The four types of events reported by IDS
49. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Some ways to bypass firewall protections
Stateless packet filter
Bridge
No State Inspection ACK flag set
50. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
Smurf attack
Some reasons to use UDP over TCP
Some honeypot advantages
Arbitrary substitution