SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Relies on executable code insertion and user interaction to spread
Deep packet inspection
The CIA triad
Parasitic malware
File Integrity checking work
2. Malware - insider threat - natural disaster - terrorism - pandemic
Firewall
Denial of service
Checksum in UDP
What primary threats should be protected against
3. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
SYN flood
PAN
No State Inspection ACK flag set
ATM work
4. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
IDS data normalization
Ack Piggybacking
Switches
SYN flood
5. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
What's an easy way to test encryption?
Group
The four basic approaches to defense in depth
Internet
6. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Rootkit
Macro virus
Hping
LAN
7. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Some FTP dangers
The Information Centric defense in depth
Integrity of Data
What threats should be protected against - based on threat levels
8. The Practice of sending an ACK inside another packet going to the same destination
Ack Piggybacking
Risk
What range is a class A network?
Some firewall benefits
9. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
What primary threats should be protected against
Datagram length of a UDP packet
Rootkit
Checksum in UDP
10. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
A network protocol
To close a TCP session
Denial of service
Browsing attack
11. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Address Resolution Protocol (ARP)
Deep packet inspection
Honeyd
When setting up a virtual circuit
12. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
What range is a class C network?
Some other UDP based protocols
NAC
What primary threats should be protected against
14. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
WAN
A network protocol
Boot record infector
CIDR
15. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Worms
Types of viruses
Some firewall benefits
When talking about protocols and referencing layers - what stack is used
16. Provides insight into the tactics - motives - and attacker tools
IDS signature analysis work
Honeyd
Some reasons to use UDP over TCP
Some honeypot advantages
17. 53 bytes - 48 bytes for data - 5 bytes for the header
Total cell size for asynchronous transfer mode (ATM)
Some types of malicious code
A blind FTP
Trap door
18. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Race conditions
Stateless packet filter
PAN
The protected enclave to defense in depth
19. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
3-way handshake
Some external threat concerns
Some firewall challenges
MAN
20. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
ATM work
CIDR
Honeyd
SQL Slammer Worm
21. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Network stumbler
Stateless packet filter
Multi protocol label switching
Switches
22. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
A network protocol
War Dialing
Stateful firewall
3-way handshake
23. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
A blind FTP
Permutation
File Integrity checking work
Rootkit
24. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
The CIA triad
3-way handshake
NIDS challenges
The threat vector analysis in defense in depth
25. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
To establish a TCP session
A blind FTP
Hping
A netcat listener
26. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Browsing attack
What range is a class C network?
DDoS attack
NIDS advantages
27. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
Smurf attack
The transport layer
Program infector
28. Syn - Syn/Ack - Ack
Overview of TCP
Address resolution protocol
To establish a TCP session
Stateless packet filter
29. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
Honeyd
Race conditions
The network layer
What ways should the crypto key be protected?
30. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
The transport layer
Anomaly analysis work
Port scan
Risk
31. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
COM/Script program infector
Router
Social engineering
Smurf attack
32. It makes sure the data sent from one side to the other is in a format useful to the other side
To close a TCP session
The presentation layer
Some FTP dangers
Rootkit
33. Confidentiality - integrity - availability
Router
The CIA triad
UDP packet headers
The three goals of security
34. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Buffer overflow
Vulnerabilities
Address resolution protocol
Snort
35. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Snort
Race conditions
HIDS monitor
Honeypot
36. Handles transmissions across the physical media like wires - fiber - etc
Program infector
The physical layer stack
Deep packet inspection
Wardriving
37. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS signature analysis work
Anomaly analysis work
Plaintext
IDS data normalization
38. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
TFTP
NAC
The OSI model
The conficker worm
39. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Deep packet inspection
The Uniform Protection to defense in depth
Some reasons to use UDP over TCP
Stateful firewall
40. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
The presentation layer
Trap door
What range is a class A network?
The protected enclave to defense in depth
41. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
The physical layer stack
LAN
Types of ATM virtual circuits
Alteration of code
42. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Router
NIDS advantages
Some network design objectives
Address resolution protocol
43. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
Denial of service
SQL Slammer Worm
When setting up a virtual circuit
The CIA triad
44. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Social engineering
Kismet
The conficker worm
Some reasons to use TCP over UDP
45. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
What threats should be protected against - based on threat levels
Some reasons to use UDP over TCP
Port scan
Some disadvantages of honeypots
46. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
TFTP
A netmask
Best way to protect wireless networks
The three goals of security
47. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Ack Piggybacking
Some Pen Test techniques
Hping
COM/Script program infector
48. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Alteration of code
Some common TCP ports
TFTP
Worms
49. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
A netmask
No State Inspection ACK flag set
Arbitrary substitution
ACK piggybacking
50. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Some disadvantages of honeypots
Multi protocol label switching
Proxy or application gateway
OS Command Injection defenses
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests