SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OSI
When talking about protocols and referencing layers - what stack is used
Some external threat concerns
Integrity of Data
Logic bomb
2. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Shallow packet inspection
Bus Topology
Social engineering
Parasitic malware
3. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Logic bomb
Hubs
MAN
SYN flood
4. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Alteration of code
Some external threat concerns
Port scan
A network protocol
6. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Deep packet inspection
Defense in depth
Nmap scanning techniques
Some types of malicious code
7. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
NIDS challenges
Rotation?
What range is a class C network?
The three goals of security
8. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some firewall benefits
Switches
Types of ATM virtual circuits
Total cell size for asynchronous transfer mode (ATM)
9. Not a replacement for firewalls - hardening - strong policies - or other DiD methods - low maintenance - inexpensive
Some reasons to use TCP over UDP
Some firewall benefits
Risk
IDS not
10. logic bomb - trojan horse - trap door
Some types of malicious code
What primary threats should be protected against
File Integrity checking work
Port scan
11. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Internet
A netcat listener
Bus Topology
Multi protocol label switching
12. Relies on executable code insertion and user interaction to spread
LAN
Parasitic malware
The data link layer
The OSI model
13. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
DDoS attack
Some Pen Test techniques
Some other UDP based protocols
HIDS monitor
14. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Switches
Some disadvantages of honeypots
Bus Topology
A network protocol
15. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
The different cable categories
Nmap
Some network design objectives
When talking about protocols and referencing layers - what stack is used
16. Network scanner.
Race conditions
Kismet
Total cell size for asynchronous transfer mode (ATM)
Nmap
17. Protected at rest - protected in transit - secure the key
Asynchronous Transfer Mode
Best way to protect wireless networks
What ways should the crypto key be protected?
Kismet
18. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
Log monitoring work?
What primary threats should be protected against
Hping
The five threat vectors
19. 20 - FTP data - 21 - FTP - 23 - Telnet - 25 - SNMP - 53 - DNS - 79 - Finger - 80 - HTTP - 110 - POP - 443 - HTTPS
Firewall
When talking about protocols and referencing layers - what stack is used
Some common TCP ports
Bus Topology
20. Known - unknown - zero day
HIDS monitor
What categories do vulnerabilities fall into?
Bus Topology
Honeypot
21. Multiple levels of protection must be deployed - an exercie in detection - measures must be across a wide range of controls - compromises happen when people leave sites - risk - CIA triad - strategies
Shallow packet inspection
Datagram length of a UDP packet
Defense in depth
Rootkit
22. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
Some types of malicious code
Bridge
MAN
Snort
23. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Some NIDS topology limitations
The protected enclave to defense in depth
MAN
Ack Piggybacking
24. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Proxy or application gateway
Integrity of Data
Switches
Vulnerabilities
25. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Kismet
The Information Centric defense in depth
The session layer
Some common UDP ports
26. Malware - insider threat - natural disaster - terrorism - pandemic
The difference in stacks
Some common UDP ports
Parasitic malware
What primary threats should be protected against
27. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
UDP packet headers
Ack Piggybacking
CIDR
Risk
28. FIN 130 - ACK 131 - FIN 570 - ACK 571
Types of ATM virtual circuits
Logic bomb
UDP packet headers
To close a TCP session
29. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
Buffer overflow
A netmask
NIDS advantages
Defense in depth
30. Stateful firewalls maintain state of traffic flows
Worms
Stateful firewall
Some Pen Test techniques
IDS signature analysis work
31. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Integrity of Data
TFTP
The conficker worm
Stateful firewall
32. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Asynchronous Transfer Mode
ACK piggybacking
LAN
Honeypot
33. A system resource that has no legitimate purpose or reason for someone to connect to it - its purpose is to draw in attackers to understand how they break into a system
Honeypot
Some common UDP ports
What ways should the crypto key be protected?
The five threat vectors
34. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Overview of TCP
WAN
Bridge
The four basic approaches to defense in depth
35. Uses flow control to handle network congestion - can send larger amounts of data per packet - has guaranteed delivery of transmitted data - better protection against spoofing - reduces need for error checking at higher OSI layers
Honeyd
Some reasons to use TCP over UDP
Program infector
Some firewall benefits
36. Migrate to WPA2 - use strong authentication like PEAP or TTLS - audit network installations - require mutual auth between client and infrastructure equipment
DDoS attack
Honeypot
IDS signature analysis work
Best way to protect wireless networks
37. An attempt to gain access by bombarding it with guesses until the password is found.
ATM work
What ways should the crypto key be protected?
Brute force
Some disadvantages of honeypots
38. destruction of data - leaking confidential information - providing backdoor access
Browsing attack
Nmap
Some malware capabilities
Smurf attack
39. Common backdoor to open a port - port scan scans for open ports on remote host - scans 0 - 65 -535 twice. TCP and UDP
The session layer
Port scan
The Uniform Protection to defense in depth
The conficker worm
40. ATM supports two types of virtual circuits: permanent virtual circuits and switches virtual circuit - PVC is set up in advance - usually manually - SVC is established automatically through a signaling protocol and can be created on the fly - establis
UDP packet headers
Types of ATM virtual circuits
Group
Bridge
41. Intrusion detection system - it reports attacks against monitored systems/networks
The data link layer
Honeypot
The protected enclave to defense in depth
IDS
42. A cracking tool inserted into the OS that allows the attacker to do as they please.
Some FTP dangers
The different cable categories
Rootkit
Some ways to bypass firewall protections
43. Poor programming without error checking can allow commands to be run in an input field. This can point to a command further in the buffer that will execute the attacker's payload.
Ciphertext
Buffer overflow
Arbitrary substitution
Datagram length of a UDP packet
44. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
When implementing protocols - what stack should be used?
Ack Piggybacking
Checksum in UDP
The goals of cryptography
45. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Arbitrary substitution
The three goals of security
To establish a TCP session
What ways should the crypto key be protected?
46. The practice of sending an ACK inside another packet going to the same destination
ACK piggybacking
Datagram length of a UDP packet
NAC
Remote maintenance
47. The Practice of sending an ACK inside another packet going to the same destination
Kismet
Ack Piggybacking
Switches
What categories do vulnerabilities fall into?
48. Infects MBR - no network spreading potential
The goals of cryptography
Boot record infector
Proxy or application gateway
Network stumbler
49. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
Permutation
Bus Topology
Some network design objectives
Trojan horse
50. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
The TCP/IP model
Honeyd
TFTP
War Dialing