SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Best way to protect wireless networks
IDS
Internet
File integrity checking work
2. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Alteration of code
ACK piggybacking
Some reasons to use TCP over UDP
Some firewall benefits
3. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
COM/Script program infector
IDS not
Arbitrary substitution
ACK piggybacking
4. Intrusion detection system - it reports attacks against monitored systems/networks
Some Pen Test techniques
IDS
The four basic approaches to defense in depth
Some firewall benefits
5. Confidentiality - symmetric encryption
Shallow packet inspection
When talking about protocols and referencing layers - what stack is used
The goals of cryptography
What ways should the crypto key be protected?
6. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Snort
Stateful firewall
IDS not
Vulnerabilities
7. Simple attack done by simply browsing available information that's allowed on a local network.
Switches
the application layer
Browsing attack
What range is a class B network?
8. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
HIDS monitor
No State Inspection ACK flag set
Asynchronous Transfer Mode
The threat vector analysis in defense in depth
9. OSI
Group
When talking about protocols and referencing layers - what stack is used
Parasitic malware
The physical layer stack
10. Uniform protection - protected enclaves - information centric - threat vector analysis
The four basic approaches to defense in depth
War Dialing
ATM work
Rootkit
11. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Boot record infector
Shallow packet inspection
Wardriving
Bus Topology
12. It makes sure the data sent from one side to the other is in a format useful to the other side
Log monitoring work?
Router
The presentation layer
Anomaly analysis work
13. Bits of code embedded in programs to quickly gain access at a later time
Rootkit
Some NIDS topology limitations
Trap door
War Dialing
14. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
File Integrity checking work
The transport layer
Bridge
A netmask
15. 53 bytes - 48 bytes for data - 5 bytes for the header
Total cell size for asynchronous transfer mode (ATM)
Some FTP dangers
What threats should be protected against - based on threat levels
Plaintext
16. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
The network layer
Some disadvantages of honeypots
Some reasons to use UDP over TCP
Some common TCP ports
17. Syn - Syn/Ack - Ack
Integrity of Data
What categories do vulnerabilities fall into?
Address Resolution Protocol (ARP)
To establish a TCP session
18. Confidentiality - integrity - availability
Defense in depth
The CIA triad
Checksum in UDP
Types of viruses
19. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Group
Network stumbler
The physical layer stack
Race conditions
20. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Anomaly analysis work
Log monitoring work?
The different cable categories
Kismet
21. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
TFTP
Trojan horse
Some malware propagation techniques
Rootkit
22. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
What range is a class C network?
A network protocol
The four types of events reported by IDS
HIDS monitor
23. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
The conficker worm
HIDS monitor
Firewall
Hping
24. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
NIDS challenges
The OSI model
The transport layer
Some external threat concerns
25. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Some honeypot advantages
Some malware capabilities
Permutation
Plaintext
26. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Risk
What categories do vulnerabilities fall into?
The OSI model
File Integrity checking work
27. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Stateless packet filter
Defense in depth
Some reasons to use TCP over UDP
PAN
28. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
EXE program infector
UDP packet headers
The four types of events reported by IDS
Trojan horse
29. Confidentiality - integrity - availability
PAN
The three goals of security
The five threat vectors
Social engineering
30. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
The difference in stacks
Bridge
Types of ATM virtual circuits
The TCP/IP model
31. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
What range is a class C network?
Some firewall benefits
the application layer
Address resolution protocol
32. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The TCP/IP model
Some external threat concerns
Smurf attack
War Dialing
33. Connects many WANs - MANs - and LANs - provided via ISP
File Integrity checking work
Internet
Network stumbler
When talking about protocols and referencing layers - what stack is used
34. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Hubs
Best way to protect wireless networks
Remote maintenance
The presentation layer
35. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
the application layer
A netmask
Some NIDS topology limitations
Types of viruses
36. Infects MBR - no network spreading potential
Deep packet inspection
Worms
Some firewall benefits
Boot record infector
37. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
The OSI model
The protected enclave to defense in depth
Race conditions
CIDR
38. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
HIDS monitor
The network layer
A netmask
What primary threats should be protected against
39. Handles transmissions across the physical media like wires - fiber - etc
COM/Script program infector
Rotation?
The physical layer stack
Browsing attack
40. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. Intellectual property - business goals - validated data - historical
Some reasons to use TCP over UDP
When setting up a virtual circuit
What threats should be protected against - based on threat levels
A blind FTP
42. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
A network protocol
the application layer
Some honeypot advantages
HIDS monitor
43. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Address Resolution Protocol (ARP)
Deep packet inspection
The threat vector analysis in defense in depth
Some common TCP ports
44. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Port scan
Some reasons to use TCP over UDP
Boot record infector
Alteration of code
45. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Program infector
Ciphertext
WAN
Types of ATM virtual circuits
46. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
No State Inspection ACK flag set
Some Pen Test techniques
Firewall
Address Resolution Protocol (ARP)
47. Personal area network - phone tethering - bluetooth - etc
The four basic approaches to defense in depth
A blind FTP
A netcat listener
PAN
48. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Checksum in UDP
Some malware propagation techniques
Some reasons to use UDP over TCP
Hubs
49. Stateful firewalls maintain state of traffic flows
The difference in stacks
LAN
Kismet
Stateful firewall
50. Attaches itself to existing program files and activated when the exe is launched
Program infector
The OSI model
Plaintext
Some other UDP based protocols
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests