SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One is for talking - one is for implementing
The physical layer stack
Ciphertext
Kismet
The difference in stacks
2. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Vulnerabilities
Nmap
Smurf attack
Hubs
3. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
The different cable categories
SQL Slammer Worm
Vulnerabilities
Anomaly analysis work
4. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
Nmap scanning techniques
IDS data normalization
Some disadvantages of honeypots
No State Inspection ACK flag set
5. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Smurf attack
CIDR
Defense in depth
Integrity of Data
6. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Some firewall challenges
Some ways to bypass firewall protections
UDP packet headers
Log monitoring work?
7. Syn - Syn/Ack - Ack
The data link layer
Boot record infector
DDoS attack
To establish a TCP session
8. 53 bytes - 48 bytes for data - 5 bytes for the header
Rootkit
Some firewall challenges
Total cell size for asynchronous transfer mode (ATM)
Wardriving
9. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Rootkit
Some disadvantages of honeypots
Social engineering
The different cable categories
10. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
Log monitoring work?
A netmask
Multi protocol label switching
Honeypot
11. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Some honeypot advantages
NIDS challenges
Macro virus
UDP packet headers
12. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
What range is a class B network?
What ways should the crypto key be protected?
Some Pen Test techniques
Datagram length of a UDP packet
13. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
Buffer overflow
NAC
Nmap
Total cell size for asynchronous transfer mode (ATM)
14. Infects MBR - no network spreading potential
The difference in stacks
OS Command Injection defenses
Total cell size for asynchronous transfer mode (ATM)
Boot record infector
15. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
The network layer
The physical layer stack
NIDS advantages
Datagram length of a UDP packet
16. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Types of viruses
IDS data normalization
Snort
File integrity checking work
17. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
NIDS advantages
Macro virus
Port scan
File integrity checking work
18. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Best way to protect wireless networks
Some disadvantages of honeypots
The TCP/IP model
ATM work
19. Uniform protection - protected enclaves - information centric - threat vector analysis
NAC
MAN
The four basic approaches to defense in depth
Bus Topology
20. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
What threats should be protected against - based on threat levels
Multi protocol label switching
What range is a class C network?
ATM work
21. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Browsing attack
Nmap
Vulnerabilities
COM/Script program infector
22. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
3-way handshake
Hping
LAN
Some Pen Test techniques
24. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some firewall benefits
What range is a class B network?
Some network design objectives
The data link layer
25. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
What range is a class C network?
LAN
A netcat listener
Rotation?
26. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
SYN flood
Group
Hubs
Social engineering
27. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Risk
Some malware propagation techniques
File Integrity checking work
Datagram length of a UDP packet
28. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
NAC
The OSI Protocol Stack
What ways should the crypto key be protected?
The difference in stacks
29. Relies on executable code insertion and user interaction to spread
Stateful firewall
Parasitic malware
Browsing attack
Some malware capabilities
30. Provides insight into the tactics - motives - and attacker tools
Boot record infector
Some honeypot advantages
The data link layer
Some disadvantages of honeypots
31. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
Kismet
Race conditions
Some FTP dangers
32. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Some NIDS topology limitations
The different cable categories
Proxy or application gateway
A netcat listener
33. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
Buffer overflow
Checksum in UDP
To close a TCP session
IDS data normalization
34. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
The session layer
Honeyd
Internet
Deep packet inspection
35. Network scanner.
Rotation?
Some common UDP ports
Stateless packet filter
Nmap
36. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
NAC
Internet
Hubs
Deep packet inspection
37. Personal area network - phone tethering - bluetooth - etc
PAN
File integrity checking work
Risk
ACK piggybacking
38. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
A network protocol
The TCP/IP model
Logic bomb
IDS not
39. Malware - insider threat - natural disaster - terrorism - pandemic
What primary threats should be protected against
The difference in stacks
The session layer
Stateless packet filter
40. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Switches
Permutation
Some firewall challenges
Some Pen Test techniques
41. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
The goals of cryptography
The threat vector analysis in defense in depth
A netcat listener
Kismet
42. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Some ways to bypass firewall protections
Network stumbler
Some common TCP ports
What range is a class A network?
43. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Hping
No State Inspection ACK flag set
The Uniform Protection to defense in depth
Ack Piggybacking
44. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The TCP/IP model
Asynchronous Transfer Mode
The goals of cryptography
Wardriving
45. Confidentiality - integrity - availability
Some external threat concerns
Trojan horse
Some malware propagation techniques
The three goals of security
46. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
File Integrity checking work
Kismet
OS Command Injection defenses
When implementing protocols - what stack should be used?
47. Stateful firewalls maintain state of traffic flows
Permutation
What threats should be protected against - based on threat levels
Stateful firewall
PAN
48. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
The physical layer stack
SQL Slammer Worm
Best way to protect wireless networks
Hping
49. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Router
The transport layer
Firewall
PAN
50. A cracking tool inserted into the OS that allows the attacker to do as they please.
Multi protocol label switching
IDS data normalization
IDS signature analysis work
Rootkit