SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol for mapping an IP address to a physical machine address that is recognized on the local network. A table - usually called the ARP cache - is used to maintain a correlation between each MAC and its corresponding IP address
Types of ATM virtual circuits
Address resolution protocol
Asynchronous Transfer Mode
ATM work
2. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
Social engineering
Some malware propagation techniques
What threats should be protected against - based on threat levels
SQL Slammer Worm
3. Infects the EXE and make them operate slightly different - when infected - exe header sizes are altered to point to the appended viral code
3-way handshake
EXE program infector
Nmap
Some other UDP based protocols
4. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
UDP packet headers
Risk
Permutation
Some malware propagation techniques
5. Means multiple iterations won't matter. If you encrypt with a key - then re-encrypt - it's the same as using one key.
What's an easy way to test encryption?
MAN
Browsing attack
Group
6. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
Some firewall benefits
Race conditions
LAN
Macro virus
7. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
Some FTP dangers
What range is a class B network?
The protected enclave to defense in depth
Remote maintenance
8. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Kismet
ATM work
Checksum in UDP
To close a TCP session
9. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
EXE program infector
NAC
To establish a TCP session
Hping
10. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
DDoS attack
File integrity checking work
Logic bomb
Some external threat concerns
11. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
Race conditions
Port scan
When implementing protocols - what stack should be used?
3-way handshake
12. Anonymous FTP - FTP passes through clear text - Bounce attacks with the PORT command - user can cause an FTP to open a connection from the FTP's own commands and bypass a firewall
Boot record infector
Some FTP dangers
HIDS monitor
3-way handshake
13. fast - with little fidelity - examines header information and limited payload data
WAN
No State Inspection ACK flag set
Shallow packet inspection
Race conditions
14. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
The four types of events reported by IDS
The CIA triad
EXE program infector
File integrity checking work
15. Hash Authentication - asymmetric - non repudiation - digital signature - hash + asymmetry
Integrity of Data
Some reasons to use TCP over UDP
Some external threat concerns
Smurf attack
16. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
War Dialing
CIDR
SQL Slammer Worm
Worms
17. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
Some malware capabilities
Shallow packet inspection
Kismet
18. One is for talking - one is for implementing
The difference in stacks
Defense in depth
What range is a class B network?
When implementing protocols - what stack should be used?
19. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
War Dialing
Social engineering
What threats should be protected against - based on threat levels
Ack Piggybacking
20. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
The session layer
Checksum in UDP
Some common TCP ports
Log monitoring work?
21. Network scanner.
The five threat vectors
Nmap
Some types of malicious code
Some reasons to use UDP over TCP
22. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
Some reasons to use UDP over TCP
IDS
Router
Some malware capabilities
23. Provides insight into the tactics - motives - and attacker tools
Some firewall challenges
Some reasons to use UDP over TCP
NAC
Some honeypot advantages
24. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Bridge
When implementing protocols - what stack should be used?
The threat vector analysis in defense in depth
What range is a class A network?
25. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
The OSI model
The Information Centric defense in depth
NIDS advantages
Denial of service
26. Unified data carrying service - replacing from replay and ATM
The transport layer
Remote maintenance
Multi protocol label switching
Brute force
27. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
TFTP
The five threat vectors
When implementing protocols - what stack should be used?
ATM work
28. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
Log monitoring work?
Alteration of code
Ciphertext
Some common UDP ports
29. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
When setting up a virtual circuit
Checksum in UDP
The three goals of security
The goals of cryptography
30. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Logic bomb
What's an easy way to test encryption?
NIDS challenges
Rotation?
31. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Group
Some firewall benefits
What categories do vulnerabilities fall into?
Checksum in UDP
32. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
TFTP
Some malware propagation techniques
Permutation
The Uniform Protection to defense in depth
33. Resource exhaustion like DDoS or fork attack - unexpected input value the machine does not know how to process
DDoS attack
Denial of service
Some disadvantages of honeypots
Proxy or application gateway
34. Intellectual property - business goals - validated data - historical
Port scan
Group
Network stumbler
What threats should be protected against - based on threat levels
35. Relies on executable code insertion and user interaction to spread
What threats should be protected against - based on threat levels
Hubs
The three goals of security
Parasitic malware
36. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Race conditions
Some network design objectives
Deep packet inspection
A network protocol
37. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
Macro virus
NAC
Denial of service
Network stumbler
38. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Risk
CIDR
Address resolution protocol
The conficker worm
39. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
A netcat listener
The TCP/IP model
Macro virus
To close a TCP session
40. Uniform protection - protected enclaves - information centric - threat vector analysis
NIDS challenges
Stateful firewall
Asynchronous Transfer Mode
The four basic approaches to defense in depth
41. destruction of data - leaking confidential information - providing backdoor access
Some malware capabilities
The conficker worm
LAN
What's an easy way to test encryption?
42. Full open - half open (stealth scan) - UDP - Ping
Some ways to bypass firewall protections
Ciphertext
Nmap scanning techniques
Some Pen Test techniques
43. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Some other UDP based protocols
Wardriving
Router
Some external threat concerns
44. Going around with equipment to detect wireless networks
Wardriving
Risk
Boot record infector
Defense in depth
45. A cracking tool inserted into the OS that allows the attacker to do as they please.
ACK piggybacking
ATM work
Rootkit
The presentation layer
46. Most common approach - firewall - VPN - intrusion detection - AV - disk encryption - all parts of the organization receive equal protection - particularly vulnerable to malicious inside attacks
The network layer
The Uniform Protection to defense in depth
Port scan
Vulnerabilities
47. Personal area network - phone tethering - bluetooth - etc
Arbitrary substitution
Kismet
PAN
Brute force
48. packet filter firewalls rely on TCP flags to determine connection state. Attacker can send ACK packets only to bypass firewall.
Address resolution protocol
IDS data normalization
No State Inspection ACK flag set
The difference in stacks
49. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
What categories do vulnerabilities fall into?
Some firewall benefits
When implementing protocols - what stack should be used?
Shallow packet inspection
50. An agreement on how different computer will work - protocols define the format and order of messages and what to do upon receipt of the messages - basically the rules of the network
Deep packet inspection
The five threat vectors
The threat vector analysis in defense in depth
A network protocol