SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Datagram length of a UDP packet
What range is a class B network?
IDS not
Address Resolution Protocol (ARP)
2. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
When talking about protocols and referencing layers - what stack is used
The protected enclave to defense in depth
IDS data normalization
EXE program infector
3. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Alteration of code
Some malware propagation techniques
UDP packet headers
What ways should the crypto key be protected?
4. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
The Uniform Protection to defense in depth
Denial of service
CIDR
What's an easy way to test encryption?
5. Threat requires a vector to cross the vulnerability - stop the ability of the threat to use the vector
The threat vector analysis in defense in depth
The Uniform Protection to defense in depth
To establish a TCP session
Wardriving
6. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
Stateful firewall
Some FTP dangers
A netmask
LAN
7. Infects MBR - no network spreading potential
The CIA triad
Boot record infector
What range is a class B network?
OS Command Injection defenses
8. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Some other UDP based protocols
Race conditions
The transport layer
Nmap scanning techniques
9. 53 bytes - 48 bytes for data - 5 bytes for the header
Wardriving
The five threat vectors
Asynchronous Transfer Mode
Total cell size for asynchronous transfer mode (ATM)
10. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Some types of malicious code
Some reasons to use TCP over UDP
Rootkit
Nmap scanning techniques
11. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
What range is a class C network?
Browsing attack
Some ways to bypass firewall protections
Some malware propagation techniques
12. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Log monitoring work?
SQL Slammer Worm
Some reasons to use UDP over TCP
Network stumbler
13. It handles the establishment and maintenance of connections between systems
Ack Piggybacking
Types of viruses
The session layer
EXE program infector
14. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
The session layer
HIDS monitor
Smurf attack
What categories do vulnerabilities fall into?
15. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Firewall
Bridge
Kismet
Some other UDP based protocols
16. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Wardriving
The Uniform Protection to defense in depth
Nmap scanning techniques
NAC
17. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
Some ways to bypass firewall protections
WAN
A netmask
18. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
Some common UDP ports
The OSI Protocol Stack
Hubs
Types of ATM virtual circuits
19. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Stateless packet filter
Integrity of Data
A blind FTP
Router
20. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Rotation?
Some disadvantages of honeypots
A network protocol
To close a TCP session
21. Protected at rest - protected in transit - secure the key
What ways should the crypto key be protected?
What's an easy way to test encryption?
The TCP/IP model
No State Inspection ACK flag set
22. Relies on executable code insertion and user interaction to spread
TFTP
Switches
UDP packet headers
Parasitic malware
23. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
EXE program infector
Hubs
Some FTP dangers
Ack Piggybacking
24. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
Port scan
What range is a class C network?
IDS signature analysis work
A netcat listener
25. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
The session layer
The network layer
SYN flood
The five threat vectors
26. Confidentiality - symmetric encryption
Overview of TCP
When setting up a virtual circuit
The goals of cryptography
Router
27. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Some ways to bypass firewall protections
Trojan horse
UDP packet headers
Alteration of code
28. open source tool for monitoring - can be used as a NIDS - has quick updates and flexibility for custom rules
Log monitoring work?
IDS data normalization
Snort
Bridge
29. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
When setting up a virtual circuit
Risk
A blind FTP
Some network design objectives
30. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Ack Piggybacking
What range is a class A network?
Asynchronous Transfer Mode
Browsing attack
31. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
A network protocol
PAN
SYN flood
Stateless packet filter
32. Malware - insider threat - natural disaster - terrorism - pandemic
Worms
Trojan horse
What primary threats should be protected against
A netmask
33. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
What range is a class A network?
Some external threat concerns
The physical layer stack
Types of viruses
34. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Defense in depth
Some reasons to use TCP over UDP
Hping
Firewall
35. Uniform protection - protected enclaves - information centric - threat vector analysis
SQL Slammer Worm
ACK piggybacking
UDP packet headers
The four basic approaches to defense in depth
36. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
the application layer
What range is a class A network?
Port scan
The OSI model
37. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Some other UDP based protocols
3-way handshake
What ways should the crypto key be protected?
OS Command Injection defenses
38. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
No State Inspection ACK flag set
the application layer
A network protocol
IDS signature analysis work
39. True positive - false positive - true negative - false negative
Parasitic malware
The four types of events reported by IDS
The OSI model
Some other UDP based protocols
40. Considered to be a perimeter device
The Uniform Protection to defense in depth
Router
The OSI model
SQL Slammer Worm
41. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Best way to protect wireless networks
COM/Script program infector
Defense in depth
SQL Slammer Worm
42. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Deep packet inspection
Datagram length of a UDP packet
What categories do vulnerabilities fall into?
Honeypot
43. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
When setting up a virtual circuit
Arbitrary substitution
Log monitoring work?
The CIA triad
44. Attaches itself to existing program files and activated when the exe is launched
Asynchronous Transfer Mode
Program infector
COM/Script program infector
The protected enclave to defense in depth
45. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Router
The difference in stacks
CIDR
Ciphertext
46. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
File Integrity checking work
Anomaly analysis work
Worms
What range is a class A network?
47. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
The transport layer
SQL Slammer Worm
Nmap scanning techniques
Multi protocol label switching
48. Simple attack done by simply browsing available information that's allowed on a local network.
Race conditions
Port scan
Browsing attack
No State Inspection ACK flag set
49. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Ack Piggybacking
When implementing protocols - what stack should be used?
Some NIDS topology limitations
Some other UDP based protocols
50. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Social engineering
What range is a class B network?
Types of ATM virtual circuits
What range is a class A network?