SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Best way to protect wireless networks
Some NIDS topology limitations
Trojan horse
Some malware capabilities
2. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
The data link layer
A blind FTP
Log monitoring work?
Some firewall challenges
3. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
What range is a class B network?
Multi protocol label switching
Asynchronous Transfer Mode
4. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Bridge
Some common TCP ports
Overview of TCP
NIDS challenges
5. It interacts with the application layer to determine which network services will be required
IDS
Some malware capabilities
Internet
the application layer
6. logic bomb - trojan horse - trap door
The threat vector analysis in defense in depth
Alteration of code
Some types of malicious code
Trap door
7. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
EXE program infector
A network protocol
Rotation?
IDS signature analysis work
8. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
What's an easy way to test encryption?
Remote maintenance
NAC
Network stumbler
9. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
When setting up a virtual circuit
The physical layer stack
A network protocol
Router
10. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Address Resolution Protocol (ARP)
Some reasons to use UDP over TCP
WAN
Some common TCP ports
11. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
A netcat listener
Anomaly analysis work
Asynchronous Transfer Mode
The Information Centric defense in depth
12. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
The presentation layer
Permutation
Hping
Some malware capabilities
13. Infects MBR - no network spreading potential
IDS not
The session layer
Ack Piggybacking
Boot record infector
14. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
The TCP/IP model
The protected enclave to defense in depth
A blind FTP
Honeyd
15. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Snort
Datagram length of a UDP packet
No State Inspection ACK flag set
A blind FTP
16. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Group
Hubs
Best way to protect wireless networks
Parasitic malware
17. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
What range is a class C network?
Some external threat concerns
HIDS monitor
Trap door
19. Considered to be a perimeter device
What's a VLAN
Router
Some malware propagation techniques
The protected enclave to defense in depth
20. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Wardriving
The protected enclave to defense in depth
Some ways to bypass firewall protections
HIDS monitor
21. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Integrity of Data
Log monitoring work?
Some reasons to use TCP over UDP
The different cable categories
22. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some firewall benefits
The protected enclave to defense in depth
Bridge
Stateful firewall
23. Unified data carrying service - replacing from replay and ATM
The Uniform Protection to defense in depth
The Information Centric defense in depth
Some other UDP based protocols
Multi protocol label switching
24. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Checksum in UDP
When implementing protocols - what stack should be used?
PAN
Rotation?
25. FIN 130 - ACK 131 - FIN 570 - ACK 571
Proxy or application gateway
To close a TCP session
When setting up a virtual circuit
The conficker worm
26. A cracking tool inserted into the OS that allows the attacker to do as they please.
Some types of malicious code
Alteration of code
COM/Script program infector
Rootkit
27. Confidentiality - integrity - availability
NIDS advantages
Hubs
Anomaly analysis work
The three goals of security
28. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
Rootkit
IDS not
TFTP
The threat vector analysis in defense in depth
29. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
Denial of service
Some reasons to use TCP over UDP
Parasitic malware
Trap door
30. Publish separate mail - web - and DNS servers to the internet - provide appropriate access from internal network to internet - protect internal from external attack - provide defense in depth - protect all aspects of the system
Some network design objectives
TFTP
Some malware capabilities
Types of ATM virtual circuits
31. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Bus Topology
What categories do vulnerabilities fall into?
COM/Script program infector
Some common UDP ports
32. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
The OSI Protocol Stack
The TCP/IP model
The CIA triad
Some ways to bypass firewall protections
33. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
TFTP
Some Pen Test techniques
The Information Centric defense in depth
Remote maintenance
34. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Some malware propagation techniques
Some firewall benefits
Group
Nmap scanning techniques
35. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
The session layer
Social engineering
The conficker worm
Bus Topology
36. Personal area network - phone tethering - bluetooth - etc
PAN
SYN flood
Some reasons to use UDP over TCP
File Integrity checking work
37. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
OS Command Injection defenses
HIDS monitor
File Integrity checking work
IDS
38. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Snort
Some malware propagation techniques
A blind FTP
39. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
MAN
Remote maintenance
A netmask
Some external threat concerns
40. Confidentiality - symmetric encryption
A network protocol
File Integrity checking work
The session layer
The goals of cryptography
41. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
File integrity checking work
Asynchronous Transfer Mode
Log monitoring work?
The different cable categories
42. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Best way to protect wireless networks
Some disadvantages of honeypots
MAN
Some common TCP ports
43. Full open - half open (stealth scan) - UDP - Ping
Nmap scanning techniques
3-way handshake
Smurf attack
A blind FTP
44. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Trojan horse
Total cell size for asynchronous transfer mode (ATM)
The network layer
Worms
45. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Some reasons to use UDP over TCP
Router
Defense in depth
Types of ATM virtual circuits
46. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Datagram length of a UDP packet
Race conditions
the application layer
What range is a class A network?
47. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
What's a VLAN
Race conditions
Some other UDP based protocols
Port scan
48. Stateful firewalls maintain state of traffic flows
NIDS advantages
The session layer
Stateful firewall
Stateless packet filter
49. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Best way to protect wireless networks
What range is a class B network?
Address Resolution Protocol (ARP)
Vulnerabilities
50. Going around with equipment to detect wireless networks
Wardriving
Network stumbler
Switches
A netcat listener