SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attaches itself to existing program files and activated when the exe is launched
3-way handshake
SQL Slammer Worm
The difference in stacks
Program infector
2. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Best way to protect wireless networks
Alteration of code
SYN flood
Permutation
3. OSI
File integrity checking work
The OSI Protocol Stack
When talking about protocols and referencing layers - what stack is used
Buffer overflow
4. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
DDoS attack
Datagram length of a UDP packet
Some honeypot advantages
the application layer
5. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Brute force
The four types of events reported by IDS
Port scan
Log monitoring work?
6. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Some firewall challenges
Address resolution protocol
Permutation
Types of viruses
7. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
No State Inspection ACK flag set
Wardriving
Shallow packet inspection
The protected enclave to defense in depth
8. One is for talking - one is for implementing
Overview of TCP
The OSI model
the application layer
The difference in stacks
9. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Some malware capabilities
Trap door
The conficker worm
Switches
10. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Smurf attack
Alteration of code
Some Pen Test techniques
Some network design objectives
11. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
A netcat listener
SQL Slammer Worm
Some Pen Test techniques
12. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Alteration of code
Program infector
When implementing protocols - what stack should be used?
What range is a class B network?
13. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
The four types of events reported by IDS
IDS signature analysis work
Bus Topology
The transport layer
14. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Some disadvantages of honeypots
The goals of cryptography
The presentation layer
Wardriving
15. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
Integrity of Data
Alteration of code
Worms
16. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Log monitoring work?
Macro virus
Integrity of Data
Nmap
17. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
When setting up a virtual circuit
MAN
No State Inspection ACK flag set
Integrity of Data
19. Message in its encrypted form
Buffer overflow
Ciphertext
Social engineering
Alteration of code
20. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Honeyd
Some other UDP based protocols
Address Resolution Protocol (ARP)
The presentation layer
21. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Remote maintenance
Types of viruses
The transport layer
Group
22. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Plaintext
CIDR
What range is a class B network?
Types of ATM virtual circuits
23. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
When talking about protocols and referencing layers - what stack is used
Some reasons to use TCP over UDP
The Information Centric defense in depth
Parasitic malware
24. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Some FTP dangers
What range is a class C network?
Trojan horse
Honeypot
25. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
IDS not
The TCP/IP model
Network stumbler
WAN
26. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
Denial of service
IDS
TFTP
27. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Checksum in UDP
Honeyd
Proxy or application gateway
Risk
28. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
Multi protocol label switching
Risk
Social engineering
Buffer overflow
29. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
Vulnerabilities
WAN
What categories do vulnerabilities fall into?
30. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
Address Resolution Protocol (ARP)
The different cable categories
Trojan horse
NIDS advantages
31. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Some reasons to use UDP over TCP
When implementing protocols - what stack should be used?
What categories do vulnerabilities fall into?
Logic bomb
32. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
IDS not
Trap door
Rootkit
Address Resolution Protocol (ARP)
33. logic bomb - trojan horse - trap door
Some types of malicious code
Some firewall benefits
Parasitic malware
PAN
34. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Types of ATM virtual circuits
Some reasons to use TCP over UDP
A netcat listener
Rotation?
35. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Some malware propagation techniques
Checksum in UDP
Denial of service
COM/Script program infector
36. 53 bytes - 48 bytes for data - 5 bytes for the header
Types of viruses
Boot record infector
Bus Topology
Total cell size for asynchronous transfer mode (ATM)
37. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
3-way handshake
NIDS challenges
Rootkit
Wardriving
38. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
The conficker worm
Social engineering
What primary threats should be protected against
NAC
39. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Risk
LAN
Some other UDP based protocols
File integrity checking work
40. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
The TCP/IP model
Some common UDP ports
The four basic approaches to defense in depth
NIDS challenges
41. Provides insight into the tactics - motives - and attacker tools
Some honeypot advantages
Proxy or application gateway
ATM work
Some NIDS topology limitations
42. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Social engineering
Firewall
ATM work
Shallow packet inspection
43. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
The threat vector analysis in defense in depth
Some ways to bypass firewall protections
Risk
What range is a class C network?
44. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Kismet
The Uniform Protection to defense in depth
Remote maintenance
What range is a class C network?
45. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Group
The difference in stacks
Log monitoring work?
Race conditions
46. destruction of data - leaking confidential information - providing backdoor access
Some firewall benefits
Some malware capabilities
Bridge
The Information Centric defense in depth
47. Simple attack done by simply browsing available information that's allowed on a local network.
Macro virus
A netcat listener
Browsing attack
Rootkit
48. fast - with little fidelity - examines header information and limited payload data
Shallow packet inspection
UDP packet headers
Kismet
Some common TCP ports
49. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Deep packet inspection
File integrity checking work
Risk
The OSI model
50. Bits of code embedded in programs to quickly gain access at a later time
Best way to protect wireless networks
Integrity of Data
SQL Slammer Worm
Trap door
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests