SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Spread as an office attachment with executable code programmed using macro facility - targets are data files - visual basic editor and other macro languages - payload executes when the code is launched
Group
NIDS challenges
Macro virus
War Dialing
2. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
A netcat listener
The OSI Protocol Stack
LAN
Logic bomb
3. Infects MBR - no network spreading potential
ATM work
Multi protocol label switching
Boot record infector
Some external threat concerns
4. Relies on executable code insertion and user interaction to spread
The TCP/IP model
Some malware capabilities
Parasitic malware
Remote maintenance
5. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Some malware propagation techniques
LAN
Firewall
Address Resolution Protocol (ARP)
6. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
The data link layer
Parasitic malware
Some honeypot advantages
Hubs
7. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
No State Inspection ACK flag set
Some disadvantages of honeypots
Kismet
Hping
8. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Rotation?
IDS
A network protocol
A blind FTP
9. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
When setting up a virtual circuit
The three goals of security
Checksum in UDP
CIDR
10. Simple attack done by simply browsing available information that's allowed on a local network.
Browsing attack
Some common TCP ports
Address Resolution Protocol (ARP)
Buffer overflow
11. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Best way to protect wireless networks
Some types of malicious code
Hubs
The TCP/IP model
12. 53 bytes - 48 bytes for data - 5 bytes for the header
A netcat listener
File Integrity checking work
Total cell size for asynchronous transfer mode (ATM)
What primary threats should be protected against
13. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
ACK piggybacking
Types of viruses
Switches
A blind FTP
14. Intrusion detection system - it reports attacks against monitored systems/networks
Ciphertext
What threats should be protected against - based on threat levels
IDS
Asynchronous Transfer Mode
15. OSI
When talking about protocols and referencing layers - what stack is used
The threat vector analysis in defense in depth
Social engineering
the application layer
16. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
When talking about protocols and referencing layers - what stack is used
Some network design objectives
What threats should be protected against - based on threat levels
Denial of service
17. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Datagram length of a UDP packet
Some reasons to use TCP over UDP
Some malware capabilities
Ciphertext
18. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Some reasons to use TCP over UDP
Total cell size for asynchronous transfer mode (ATM)
The goals of cryptography
The difference in stacks
19. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
SQL Slammer Worm
Social engineering
Shallow packet inspection
MAN
20. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Wardriving
File integrity checking work
OS Command Injection defenses
The OSI Protocol Stack
21. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
The data link layer
Overview of TCP
Bridge
Hping
22. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Bridge
IDS data normalization
MAN
Some reasons to use TCP over UDP
23. Used for connecting two physical segments of a network - segments traffic - breaks up collision domains - not generally used because of switches
Anomaly analysis work
Bridge
Firewall
When setting up a virtual circuit
24. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
The three goals of security
3-way handshake
Some FTP dangers
The four basic approaches to defense in depth
25. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
The data link layer
Anomaly analysis work
The OSI Protocol Stack
IDS not
26. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Types of viruses
A blind FTP
Plaintext
What range is a class C network?
27. Trying to ID modems in a telephone exchange that may be susceptible to compromise
ATM work
War Dialing
Brute force
Some other UDP based protocols
28. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
A network protocol
Integrity of Data
Some ways to bypass firewall protections
Some reasons to use TCP over UDP
29. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Some disadvantages of honeypots
Nmap
Some common TCP ports
Buffer overflow
30. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
The OSI Protocol Stack
Multi protocol label switching
Some malware capabilities
Race conditions
31. Unencrypted message in its original form
Shallow packet inspection
Browsing attack
Plaintext
The data link layer
32. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Worms
War Dialing
Router
Honeyd
33. fast - with little fidelity - examines header information and limited payload data
Trojan horse
the application layer
Shallow packet inspection
Rotation?
34. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Risk
The network layer
A netmask
Switches
35. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
Types of viruses
Stateful firewall
SYN flood
WAN
36. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Some network design objectives
The OSI model
When implementing protocols - what stack should be used?
NIDS challenges
37. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
No State Inspection ACK flag set
Anomaly analysis work
MAN
Some FTP dangers
38. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
Trojan horse
Stateless packet filter
Boot record infector
Some network design objectives
39. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Worms
Best way to protect wireless networks
NIDS advantages
The different cable categories
40. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Vulnerabilities
The four basic approaches to defense in depth
What's an easy way to test encryption?
WAN
41. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Program infector
NIDS challenges
The different cable categories
Some external threat concerns
42. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
The difference in stacks
Trap door
Anomaly analysis work
Checksum in UDP
43. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
The conficker worm
Some network design objectives
Logic bomb
Alteration of code
44. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
Network stumbler
The five threat vectors
IDS signature analysis work
Remote maintenance
45. Provides insight into the tactics - motives - and attacker tools
To establish a TCP session
What range is a class B network?
Some honeypot advantages
Smurf attack
46. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Anomaly analysis work
Address Resolution Protocol (ARP)
Some firewall benefits
File integrity checking work
47. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Some FTP dangers
Permutation
ATM work
PAN
48. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
What range is a class B network?
Trojan horse
Group
Hping
49. Connects many WANs - MANs - and LANs - provided via ISP
Macro virus
Brute force
A blind FTP
Internet
50. Considered to be a perimeter device
A netcat listener
Alteration of code
To close a TCP session
Router
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests