SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Going around with equipment to detect wireless networks
Wardriving
Internet
When talking about protocols and referencing layers - what stack is used
Denial of service
3. The practice of sending an ACK inside another packet going to the same destination
What ways should the crypto key be protected?
DDoS attack
ACK piggybacking
The different cable categories
4. Relies on executable code insertion and user interaction to spread
A netcat listener
CIDR
Parasitic malware
The network layer
5. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Anomaly analysis work
What threats should be protected against - based on threat levels
Rootkit
UDP packet headers
6. Uniform protection - protected enclaves - information centric - threat vector analysis
The four basic approaches to defense in depth
Anomaly analysis work
Shallow packet inspection
ATM work
7. Intrusion detection system - it reports attacks against monitored systems/networks
Total cell size for asynchronous transfer mode (ATM)
IDS
IDS signature analysis work
The protected enclave to defense in depth
8. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
What threats should be protected against - based on threat levels
CIDR
Hping
NAC
9. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
Address Resolution Protocol (ARP)
SYN flood
Shallow packet inspection
10. Malware - insider threat - natural disaster - terrorism - pandemic
What primary threats should be protected against
Router
The OSI Protocol Stack
Some firewall challenges
11. Network scanner.
Nmap
Macro virus
What categories do vulnerabilities fall into?
A netcat listener
12. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Boot record infector
Deep packet inspection
The different cable categories
Datagram length of a UDP packet
13. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
WAN
Address Resolution Protocol (ARP)
War Dialing
Nmap
14. Message in its encrypted form
No State Inspection ACK flag set
Ciphertext
Some network design objectives
What's an easy way to test encryption?
15. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Stateful firewall
Network stumbler
Log monitoring work?
The OSI Protocol Stack
16. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Nmap
The physical layer stack
LAN
MAN
17. logic bomb - trojan horse - trap door
Some types of malicious code
The presentation layer
Risk
MAN
18. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Hubs
Social engineering
File integrity checking work
NIDS advantages
19. Unified data carrying service - replacing from replay and ATM
File Integrity checking work
Honeyd
Multi protocol label switching
Risk
20. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
Denial of service
SYN flood
What categories do vulnerabilities fall into?
Some ways to bypass firewall protections
21. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
The conficker worm
The protected enclave to defense in depth
Some Pen Test techniques
Worms
22. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Switches
Trojan horse
Some malware propagation techniques
TFTP
23. Infects MBR - no network spreading potential
Boot record infector
Some external threat concerns
Some firewall benefits
IDS not
24. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
No State Inspection ACK flag set
The Information Centric defense in depth
Overview of TCP
Plaintext
25. A cracking tool inserted into the OS that allows the attacker to do as they please.
The CIA triad
Some firewall benefits
Rootkit
The five threat vectors
26. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Arbitrary substitution
Bridge
Honeyd
Browsing attack
27. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Datagram length of a UDP packet
Total cell size for asynchronous transfer mode (ATM)
What's an easy way to test encryption?
The OSI Protocol Stack
28. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
NIDS challenges
What range is a class C network?
Internet
A netmask
29. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Honeyd
A netcat listener
Network stumbler
Alteration of code
30. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
Rootkit
Smurf attack
Honeyd
NIDS advantages
31. The Practice of sending an ACK inside another packet going to the same destination
The Uniform Protection to defense in depth
Denial of service
Ack Piggybacking
What's an easy way to test encryption?
32. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Macro virus
What primary threats should be protected against
DDoS attack
Worms
33. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Plaintext
ACK piggybacking
IDS not
Some disadvantages of honeypots
34. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
The threat vector analysis in defense in depth
Stateless packet filter
Types of ATM virtual circuits
The physical layer stack
35. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
IDS not
Risk
Macro virus
A netcat listener
36. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
What's an easy way to test encryption?
LAN
Parasitic malware
The conficker worm
37. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Checksum in UDP
Some FTP dangers
The four types of events reported by IDS
The five threat vectors
38. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
File integrity checking work
Group
Rotation?
SYN flood
39. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
Address resolution protocol
The five threat vectors
Stateless packet filter
Program infector
40. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some malware capabilities
UDP packet headers
Some firewall challenges
WAN
41. It interacts with the application layer to determine which network services will be required
Shallow packet inspection
Bridge
the application layer
Alteration of code
42. Trying to ID modems in a telephone exchange that may be susceptible to compromise
SQL Slammer Worm
Arbitrary substitution
War Dialing
Trap door
43. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Nmap scanning techniques
Rotation?
Types of ATM virtual circuits
Vulnerabilities
44. Stateful firewalls maintain state of traffic flows
Stateful firewall
Proxy or application gateway
Some ways to bypass firewall protections
Some common UDP ports
45. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
The TCP/IP model
Some other UDP based protocols
NIDS challenges
What's an easy way to test encryption?
46. Attaches itself to existing program files and activated when the exe is launched
The transport layer
Arbitrary substitution
Some malware capabilities
Program infector
47. Provides insight into the tactics - motives - and attacker tools
Some firewall benefits
Some honeypot advantages
A netmask
Parasitic malware
48. Simple attack done by simply browsing available information that's allowed on a local network.
A blind FTP
Macro virus
Browsing attack
Some reasons to use TCP over UDP
49. An attempt to gain access by bombarding it with guesses until the password is found.
The OSI model
Brute force
When implementing protocols - what stack should be used?
Bus Topology
50. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Log monitoring work?
The Uniform Protection to defense in depth
Firewall
ATM work