SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
The Information Centric defense in depth
Some ways to bypass firewall protections
Race conditions
File integrity checking work
2. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
CIDR
OS Command Injection defenses
Anomaly analysis work
Some firewall benefits
3. Stateful firewalls maintain state of traffic flows
Some FTP dangers
Stateful firewall
Social engineering
Nmap
4. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
IDS signature analysis work
Worms
Stateful firewall
MAN
5. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
Remote maintenance
Some honeypot advantages
Datagram length of a UDP packet
ACK piggybacking
6. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
Hping
Worms
To close a TCP session
The difference in stacks
7. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Deep packet inspection
Permutation
Vulnerabilities
Multi protocol label switching
8. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
The three goals of security
Honeypot
Some ways to bypass firewall protections
Permutation
9. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
Worms
Router
Arbitrary substitution
The Uniform Protection to defense in depth
10. Infects MBR - no network spreading potential
Address Resolution Protocol (ARP)
Boot record infector
Router
Plaintext
11. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Some network design objectives
Some malware capabilities
NIDS advantages
The protected enclave to defense in depth
12. Take the file and try to compress it. If it compresses - it means there is a pattern and it's more easily crackable
13. free windows based wireless scanner for 802.1b - detects access point settings - supports GSP integration - identifies networks as encrypted or unencrypted
What categories do vulnerabilities fall into?
LAN
NIDS advantages
Network stumbler
14. Trying to ID modems in a telephone exchange that may be susceptible to compromise
Hping
Stateful firewall
War Dialing
The Uniform Protection to defense in depth
15. Uses inclusive or exclusive lists - inclusive analysis utilizes a list of keywords - exclusive analysis utilizes a list of events that can be ignored
Boot record infector
Log monitoring work?
Program infector
3-way handshake
16. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
Firewall
The conficker worm
The different cable categories
What range is a class B network?
17. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Hubs
The protected enclave to defense in depth
NAC
Honeyd
18. size is whatever the length of the UDP portion of the packet. Could be as large as 65 -535
Some Pen Test techniques
Datagram length of a UDP packet
Some external threat concerns
When setting up a virtual circuit
19. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
COM/Script program infector
Anomaly analysis work
The CIA triad
Buffer overflow
20. Confidentiality - integrity - availability
The presentation layer
Hping
What range is a class A network?
The three goals of security
21. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
Social engineering
Address resolution protocol
Risk
The conficker worm
22. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
What primary threats should be protected against
Network stumbler
OS Command Injection defenses
The five threat vectors
23. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Checksum in UDP
A blind FTP
Permutation
The data link layer
24. Protected at rest - protected in transit - secure the key
File integrity checking work
The Uniform Protection to defense in depth
The four types of events reported by IDS
What ways should the crypto key be protected?
25. Bits of code embedded in programs to quickly gain access at a later time
Ack Piggybacking
Vulnerabilities
Trap door
The Information Centric defense in depth
26. Unified data carrying service - replacing from replay and ATM
Log monitoring work?
Multi protocol label switching
DDoS attack
Some ways to bypass firewall protections
27. Relies on executable code insertion and user interaction to spread
A netcat listener
Defense in depth
Parasitic malware
Boot record infector
28. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
OS Command Injection defenses
Hubs
ATM work
Stateless packet filter
29. fast - with little fidelity - examines header information and limited payload data
SQL Slammer Worm
Shallow packet inspection
Hubs
Plaintext
30. Considered to be a perimeter device
OS Command Injection defenses
Denial of service
Router
NAC
31. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
Social engineering
COM/Script program infector
NIDS challenges
A netcat listener
32. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
Alteration of code
What range is a class C network?
A blind FTP
The Uniform Protection to defense in depth
33. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
HIDS monitor
IDS data normalization
A network protocol
Firewall
34. Intrusion detection system - it reports attacks against monitored systems/networks
IDS
Bus Topology
Denial of service
COM/Script program infector
35. Known - unknown - zero day
Trojan horse
WAN
EXE program infector
What categories do vulnerabilities fall into?
36. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Some reasons to use TCP over UDP
IDS data normalization
Types of viruses
Ack Piggybacking
37. True positive - false positive - true negative - false negative
Some external threat concerns
The four types of events reported by IDS
The Uniform Protection to defense in depth
Honeypot
38. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Multi protocol label switching
Network stumbler
DDoS attack
What primary threats should be protected against
39. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
Stateful firewall
Best way to protect wireless networks
the application layer
A netcat listener
40. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
Checksum in UDP
Port scan
Stateful firewall
File integrity checking work
41. Personal area network - phone tethering - bluetooth - etc
The goals of cryptography
PAN
Some firewall benefits
Trojan horse
42. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
When implementing protocols - what stack should be used?
Kismet
Worms
Rootkit
43. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
The four types of events reported by IDS
Some firewall benefits
The physical layer stack
3-way handshake
44. Program disguised as something helpful - only to perform actions the user did not intend. Opening ports - installing other programs - etc.
Proxy or application gateway
The different cable categories
Trojan horse
The OSI Protocol Stack
45. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
Trap door
Nmap
DDoS attack
The network layer
46. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
HIDS monitor
Stateful firewall
Some disadvantages of honeypots
Group
47. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Multi protocol label switching
ATM work
What range is a class B network?
No State Inspection ACK flag set
48. Intellectual property - business goals - validated data - historical
Wardriving
Some firewall benefits
Some malware capabilities
What threats should be protected against - based on threat levels
49. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
Proxy or application gateway
WAN
The transport layer
50. Full open - half open (stealth scan) - UDP - Ping
Group
Nmap scanning techniques
Honeypot
NIDS challenges