SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
EXE program infector
Snort
Some firewall benefits
HIDS monitor
2. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
Stateful firewall
Snort
Group
When setting up a virtual circuit
3. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
The Uniform Protection to defense in depth
NAC
Macro virus
EXE program infector
4. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
WAN
Total cell size for asynchronous transfer mode (ATM)
Hubs
When talking about protocols and referencing layers - what stack is used
5. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Macro virus
Overview of TCP
DDoS attack
What ways should the crypto key be protected?
6. Intrusion detection system - it reports attacks against monitored systems/networks
Boot record infector
IDS
Honeyd
A netcat listener
7. Simple attack done by simply browsing available information that's allowed on a local network.
Stateless packet filter
What ways should the crypto key be protected?
Browsing attack
The four types of events reported by IDS
8. Four layers - Network Layer - Internet Layer - Transport Layer - Application layer
Nmap
Datagram length of a UDP packet
Arbitrary substitution
The TCP/IP model
9. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
What range is a class A network?
Some common TCP ports
Some honeypot advantages
10. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Deep packet inspection
The presentation layer
Hping
What range is a class C network?
11. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
UDP packet headers
Log monitoring work?
Checksum in UDP
Some honeypot advantages
12. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
The three goals of security
COM/Script program infector
Proxy or application gateway
The OSI model
13. Confidentiality - symmetric encryption
The data link layer
The goals of cryptography
What range is a class C network?
Arbitrary substitution
14. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Internet
The four types of events reported by IDS
Switches
Some FTP dangers
15. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
Types of ATM virtual circuits
What range is a class C network?
Permutation
Network stumbler
16. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
What's a VLAN
Shallow packet inspection
Denial of service
Some types of malicious code
17. A low end firewall that can quickly be deployed using existing hardware. They examine packets themselves with no content.
The goals of cryptography
Stateless packet filter
Honeypot
Datagram length of a UDP packet
18. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
NIDS challenges
The data link layer
Browsing attack
Nmap scanning techniques
19. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Social engineering
COM/Script program infector
Types of ATM virtual circuits
DDoS attack
20. Trying to ID modems in a telephone exchange that may be susceptible to compromise
War Dialing
Some firewall benefits
UDP packet headers
Brute force
21. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Nmap
Types of viruses
Brute force
Some malware propagation techniques
22. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
Kismet
Defense in depth
Switches
Trojan horse
23. destruction of data - leaking confidential information - providing backdoor access
Switches
Some malware capabilities
The four basic approaches to defense in depth
Ack Piggybacking
24. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Some firewall challenges
COM/Script program infector
MAN
Internet
25. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Risk
ATM work
What range is a class A network?
When setting up a virtual circuit
26. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
Some Pen Test techniques
Bridge
When setting up a virtual circuit
NAC
27. Syn - Syn/Ack - Ack
Some reasons to use TCP over UDP
Race conditions
To establish a TCP session
A netmask
28. Unencrypted message in its original form
Plaintext
Remote maintenance
COM/Script program infector
Worms
29. logic bomb - trojan horse - trap door
Checksum in UDP
Some common UDP ports
Some types of malicious code
Some malware capabilities
30. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
The protected enclave to defense in depth
Trap door
Overview of TCP
The different cable categories
31. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
PAN
What categories do vulnerabilities fall into?
EXE program infector
Race conditions
32. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Rotation?
Datagram length of a UDP packet
Stateful firewall
Boot record infector
33. Relies on executable code insertion and user interaction to spread
Parasitic malware
IDS
Shallow packet inspection
The difference in stacks
34. Malware - insider threat - natural disaster - terrorism - pandemic
Log monitoring work?
The physical layer stack
Nmap
What primary threats should be protected against
35. Network scanner.
COM/Script program infector
Nmap
CIDR
Deep packet inspection
36. Bits of code embedded in programs to quickly gain access at a later time
Trap door
When setting up a virtual circuit
Multi protocol label switching
The OSI model
37. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
The OSI Protocol Stack
The four basic approaches to defense in depth
Rootkit
Nmap
38. One is for talking - one is for implementing
Checksum in UDP
Some types of malicious code
OS Command Injection defenses
The difference in stacks
39. Provides insight into the tactics - motives - and attacker tools
IDS
Some honeypot advantages
NIDS advantages
Anomaly analysis work
40. Stateful firewalls maintain state of traffic flows
Defense in depth
Internet
Stateful firewall
Race conditions
41. Message in its encrypted form
Ciphertext
Some types of malicious code
Network stumbler
Integrity of Data
42. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
The difference in stacks
Types of ATM virtual circuits
Bus Topology
IDS signature analysis work
43. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
SYN flood
Some disadvantages of honeypots
Macro virus
The TCP/IP model
44. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
MAN
The session layer
Some ways to bypass firewall protections
Some NIDS topology limitations
45. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
When implementing protocols - what stack should be used?
The five threat vectors
Worms
NAC
46. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
Some malware propagation techniques
LAN
Permutation
Nmap
47. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Ack Piggybacking
IDS signature analysis work
OS Command Injection defenses
EXE program infector
48. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Anomaly analysis work
HIDS monitor
The session layer
Best way to protect wireless networks
49. An attempt to gain access by bombarding it with guesses until the password is found.
Firewall
The data link layer
Brute force
Some disadvantages of honeypots
50. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Logic bomb
Some firewall benefits
Denial of service
File Integrity checking work
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests