SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The TCP/IP model
Address Resolution Protocol (ARP)
Deep packet inspection
The five threat vectors
2. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
The Uniform Protection to defense in depth
The threat vector analysis in defense in depth
The presentation layer
A netcat listener
3. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Network stumbler
What range is a class A network?
The presentation layer
OS Command Injection defenses
4. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Bridge
When talking about protocols and referencing layers - what stack is used
Best way to protect wireless networks
A network protocol
5. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
COM/Script program infector
IDS
Smurf attack
Permutation
6. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Some reasons to use TCP over UDP
Some malware capabilities
Social engineering
When implementing protocols - what stack should be used?
7. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
The presentation layer
IDS signature analysis work
The four basic approaches to defense in depth
Hubs
8. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
3-way handshake
The conficker worm
What range is a class C network?
Some malware capabilities
9. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Denial of service
Some firewall challenges
The OSI model
Race conditions
10. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Remote maintenance
Logic bomb
IDS data normalization
Proxy or application gateway
11. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
What primary threats should be protected against
TFTP
Proxy or application gateway
Some common TCP ports
12. Provides insight into the tactics - motives - and attacker tools
Some honeypot advantages
Multi protocol label switching
Some malware propagation techniques
UDP packet headers
13. Unencrypted message in its original form
Plaintext
Rotation?
Stateless packet filter
To establish a TCP session
14. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Group
Macro virus
Some types of malicious code
PAN
15. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
CIDR
Snort
HIDS monitor
OS Command Injection defenses
16. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Wardriving
TFTP
Ciphertext
To establish a TCP session
17. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
The difference in stacks
Some firewall benefits
The Information Centric defense in depth
Browsing attack
18. Malware - insider threat - natural disaster - terrorism - pandemic
Race conditions
What primary threats should be protected against
War Dialing
The transport layer
19. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
File integrity checking work
Internet
The three goals of security
Risk
20. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Best way to protect wireless networks
Some external threat concerns
A blind FTP
The data link layer
21. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
PAN
The OSI model
Some malware propagation techniques
The network layer
22. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Trap door
Brute force
Some network design objectives
Some malware propagation techniques
23. It interacts with the application layer to determine which network services will be required
When talking about protocols and referencing layers - what stack is used
the application layer
NIDS challenges
Checksum in UDP
24. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
The three goals of security
Kismet
Some firewall challenges
Deep packet inspection
25. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Types of viruses
The Uniform Protection to defense in depth
File integrity checking work
File Integrity checking work
26. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Browsing attack
Nmap scanning techniques
A network protocol
MAN
27. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Switches
Defense in depth
Address Resolution Protocol (ARP)
The protected enclave to defense in depth
28. Confidentiality - integrity - availability
Rootkit
War Dialing
The five threat vectors
The CIA triad
29. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Some types of malicious code
Social engineering
HIDS monitor
NAC
30. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Macro virus
Permutation
DDoS attack
Some common TCP ports
31. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Asynchronous Transfer Mode
Hping
File Integrity checking work
Defense in depth
32. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Firewall
The goals of cryptography
Some disadvantages of honeypots
The physical layer stack
33. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
What range is a class C network?
Nmap
The different cable categories
Bridge
34. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Some FTP dangers
Arbitrary substitution
Brute force
Datagram length of a UDP packet
35. Infects MBR - no network spreading potential
Some reasons to use UDP over TCP
CIDR
Boot record infector
The Information Centric defense in depth
36. Uniform protection - protected enclaves - information centric - threat vector analysis
COM/Script program infector
The four basic approaches to defense in depth
Router
Some reasons to use TCP over UDP
37. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Ciphertext
The four types of events reported by IDS
Hubs
Parasitic malware
38. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Router
DDoS attack
The network layer
Risk
39. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Best way to protect wireless networks
Wardriving
The transport layer
Risk
40. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
The five threat vectors
Types of viruses
Address Resolution Protocol (ARP)
The Information Centric defense in depth
41. Trying to ID modems in a telephone exchange that may be susceptible to compromise
Types of ATM virtual circuits
War Dialing
Parasitic malware
What range is a class B network?
42. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
When talking about protocols and referencing layers - what stack is used
Some ways to bypass firewall protections
Port scan
The TCP/IP model
43. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Integrity of Data
The transport layer
Some common UDP ports
The conficker worm
44. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Log monitoring work?
Some common TCP ports
COM/Script program infector
Rootkit
45. It makes sure the data sent from one side to the other is in a format useful to the other side
Log monitoring work?
Group
Denial of service
The presentation layer
46. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
What's an easy way to test encryption?
Switches
When talking about protocols and referencing layers - what stack is used
Overview of TCP
47. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Firewall
Types of viruses
A blind FTP
Rotation?
48. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
The presentation layer
When setting up a virtual circuit
The CIA triad
Snort
49. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Some types of malicious code
WAN
Trojan horse
Kismet
50. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Datagram length of a UDP packet
The presentation layer
The transport layer
Hping