SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Relies on executable code insertion and user interaction to spread
Nmap scanning techniques
Multi protocol label switching
Parasitic malware
Some NIDS topology limitations
2. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
HIDS monitor
Vulnerabilities
PAN
Some disadvantages of honeypots
3. Going around with equipment to detect wireless networks
When talking about protocols and referencing layers - what stack is used
Nmap
Permutation
Wardriving
4. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
IDS
Vulnerabilities
Bridge
LAN
5. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Checksum in UDP
The threat vector analysis in defense in depth
When implementing protocols - what stack should be used?
Some Pen Test techniques
6. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Hping
What primary threats should be protected against
Some other UDP based protocols
Stateless packet filter
7. The Practice of sending an ACK inside another packet going to the same destination
Ack Piggybacking
What's a VLAN
Worms
The CIA triad
8. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
SYN flood
Bus Topology
Brute force
File Integrity checking work
9. Confidentiality - symmetric encryption
The goals of cryptography
A blind FTP
The TCP/IP model
What range is a class B network?
10. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Firewall
Risk
Some common UDP ports
Datagram length of a UDP packet
11. fast - with little fidelity - examines header information and limited payload data
Nmap scanning techniques
What range is a class C network?
Some ways to bypass firewall protections
Shallow packet inspection
12. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Bus Topology
Program infector
Anomaly analysis work
Some Pen Test techniques
13. Protected at rest - protected in transit - secure the key
What ways should the crypto key be protected?
Plaintext
Some reasons to use UDP over TCP
Social engineering
14. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Alteration of code
Bus Topology
Honeyd
Honeypot
15. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Worms
A netcat listener
Some firewall challenges
Some malware capabilities
16. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
ATM work
What's a VLAN
Some FTP dangers
A network protocol
17. Uniform protection - protected enclaves - information centric - threat vector analysis
The four basic approaches to defense in depth
IDS not
Smurf attack
Social engineering
18. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Ack Piggybacking
Best way to protect wireless networks
Router
A blind FTP
19. Malware - insider threat - natural disaster - terrorism - pandemic
Stateless packet filter
A netmask
Kismet
What primary threats should be protected against
20. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
War Dialing
The OSI Protocol Stack
Ack Piggybacking
The threat vector analysis in defense in depth
21. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Some network design objectives
What categories do vulnerabilities fall into?
The CIA triad
The Uniform Protection to defense in depth
22. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Network stumbler
Defense in depth
Deep packet inspection
Kismet
23. Infects MBR - no network spreading potential
File integrity checking work
Boot record infector
Internet
NIDS advantages
24. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
The transport layer
The threat vector analysis in defense in depth
Multi protocol label switching
A netmask
25. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Browsing attack
Proxy or application gateway
Address resolution protocol
NIDS challenges
26. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Arbitrary substitution
Permutation
Social engineering
the application layer
27. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
A blind FTP
Some malware capabilities
CIDR
Types of ATM virtual circuits
28. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Vulnerabilities
Port scan
Nmap
Some common TCP ports
29. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
NAC
Logic bomb
Integrity of Data
Trap door
30. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Log monitoring work?
MAN
Honeypot
What range is a class A network?
31. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
What ways should the crypto key be protected?
Some other UDP based protocols
Some FTP dangers
The OSI Protocol Stack
32. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Datagram length of a UDP packet
NAC
CIDR
DDoS attack
33. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Proxy or application gateway
Some reasons to use TCP over UDP
Honeypot
IDS not
34. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
The Information Centric defense in depth
A network protocol
Best way to protect wireless networks
What range is a class C network?
35. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
Types of ATM virtual circuits
Hubs
Some reasons to use UDP over TCP
36. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
What's an easy way to test encryption?
Shallow packet inspection
Brute force
UDP packet headers
37. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
Best way to protect wireless networks
TFTP
A netmask
Worms
38. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Browsing attack
SYN flood
WAN
IDS
39. Stateful firewalls maintain state of traffic flows
Some disadvantages of honeypots
Best way to protect wireless networks
Some common TCP ports
Stateful firewall
40. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Some malware propagation techniques
The presentation layer
Integrity of Data
The Information Centric defense in depth
41. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Total cell size for asynchronous transfer mode (ATM)
No State Inspection ACK flag set
The protected enclave to defense in depth
Some NIDS topology limitations
42. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
NIDS challenges
The Information Centric defense in depth
Some reasons to use UDP over TCP
Checksum in UDP
43. 53 bytes - 48 bytes for data - 5 bytes for the header
What's a VLAN
Total cell size for asynchronous transfer mode (ATM)
Router
Program infector
44. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
IDS signature analysis work
WAN
Switches
Bus Topology
45. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
When setting up a virtual circuit
IDS
Best way to protect wireless networks
HIDS monitor
46. Personal area network - phone tethering - bluetooth - etc
PAN
Asynchronous Transfer Mode
The goals of cryptography
Honeyd
47. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
The goals of cryptography
When setting up a virtual circuit
Denial of service
Honeyd
48. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Multi protocol label switching
IDS signature analysis work
Remote maintenance
Some disadvantages of honeypots
49. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
The three goals of security
EXE program infector
The different cable categories
Some network design objectives
50. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
The different cable categories
Overview of TCP
Parasitic malware
Some disadvantages of honeypots
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests