SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. It interacts with the application layer to determine which network services will be required
Kismet
Stateful firewall
Remote maintenance
the application layer
2. The practice of sending an ACK inside another packet going to the same destination
Some NIDS topology limitations
ACK piggybacking
Some malware propagation techniques
Anomaly analysis work
3. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
What range is a class A network?
Router
IDS not
The Uniform Protection to defense in depth
4. It makes sure the data sent from one side to the other is in a format useful to the other side
Some disadvantages of honeypots
The presentation layer
EXE program infector
Multi protocol label switching
5. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
3-way handshake
Parasitic malware
Some disadvantages of honeypots
Ciphertext
6. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Some common TCP ports
When implementing protocols - what stack should be used?
Overview of TCP
Social engineering
7. It handles the establishment and maintenance of connections between systems
The session layer
A netmask
Nmap scanning techniques
IDS signature analysis work
8. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
The four types of events reported by IDS
Remote maintenance
The Information Centric defense in depth
SYN flood
9. Syn - Syn/Ack - Ack
The threat vector analysis in defense in depth
Trap door
To establish a TCP session
TFTP
10. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
Integrity of Data
File Integrity checking work
Trap door
IDS signature analysis work
11. Confidentiality - symmetric encryption
PAN
Address resolution protocol
The goals of cryptography
Hping
12. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
Internet
Buffer overflow
The TCP/IP model
Race conditions
13. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Multi protocol label switching
Bridge
Risk
NIDS challenges
14. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
No State Inspection ACK flag set
LAN
What range is a class B network?
The OSI Protocol Stack
15. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Some common TCP ports
Trap door
What's an easy way to test encryption?
MAN
16. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
What's a VLAN
NIDS advantages
Trojan horse
Plaintext
17. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Nmap scanning techniques
The threat vector analysis in defense in depth
What's an easy way to test encryption?
Some disadvantages of honeypots
18. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
COM/Script program infector
Browsing attack
The conficker worm
OS Command Injection defenses
19. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Vulnerabilities
Proxy or application gateway
When implementing protocols - what stack should be used?
To establish a TCP session
20. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
3-way handshake
Some malware propagation techniques
Types of viruses
The CIA triad
21. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some NIDS topology limitations
Some malware capabilities
Browsing attack
Group
22. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some firewall challenges
Arbitrary substitution
Nmap
The different cable categories
23. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Types of viruses
Checksum in UDP
A network protocol
The transport layer
24. True positive - false positive - true negative - false negative
Smurf attack
A netcat listener
The four types of events reported by IDS
The network layer
25. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
The five threat vectors
IDS not
A blind FTP
NAC
26. A cracking tool inserted into the OS that allows the attacker to do as they please.
Multi protocol label switching
Rootkit
The difference in stacks
Some external threat concerns
27. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Trojan horse
Vulnerabilities
Browsing attack
Rotation?
28. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
The five threat vectors
The threat vector analysis in defense in depth
Log monitoring work?
Port scan
29. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Hubs
IDS data normalization
The data link layer
Social engineering
30. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Macro virus
Some external threat concerns
Risk
OS Command Injection defenses
31. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
Denial of service
The five threat vectors
Rootkit
Boot record infector
32. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Boot record infector
Some other UDP based protocols
COM/Script program infector
Network stumbler
33. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Boot record infector
Asynchronous Transfer Mode
War Dialing
34. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Trap door
Port scan
The TCP/IP model
Bus Topology
35. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Internet
Honeypot
Some types of malicious code
Macro virus
36. Relies on executable code insertion and user interaction to spread
OS Command Injection defenses
Vulnerabilities
Parasitic malware
The conficker worm
37. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Integrity of Data
What ways should the crypto key be protected?
Some common UDP ports
IDS not
38. Unencrypted message in its original form
Some Pen Test techniques
The three goals of security
Plaintext
Deep packet inspection
39. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Some honeypot advantages
Arbitrary substitution
Alteration of code
Firewall
40. Bits of code embedded in programs to quickly gain access at a later time
Trap door
Boot record infector
The conficker worm
Internet
41. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
What's an easy way to test encryption?
Risk
Honeyd
Stateless packet filter
42. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Arbitrary substitution
Some malware propagation techniques
Overview of TCP
Social engineering
43. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Checksum in UDP
The transport layer
Snort
What range is a class C network?
44. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Some common TCP ports
Social engineering
Group
CIDR
45. One is for talking - one is for implementing
The transport layer
What threats should be protected against - based on threat levels
NIDS challenges
The difference in stacks
46. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
Checksum in UDP
Stateless packet filter
Vulnerabilities
File integrity checking work
47. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
When setting up a virtual circuit
The difference in stacks
Some common TCP ports
ATM work
48. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
Deep packet inspection
Stateless packet filter
Parasitic malware
49. Uniform protection - protected enclaves - information centric - threat vector analysis
Best way to protect wireless networks
Shallow packet inspection
Worms
The four basic approaches to defense in depth
50. Attaches itself to existing program files and activated when the exe is launched
Program infector
Some types of malicious code
WAN
Alteration of code
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests