SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
Remote maintenance
Honeypot
The presentation layer
UDP packet headers
2. risk = threat x vulnerability - impossible to eliminate - security is an exercise in loss reduction
When setting up a virtual circuit
Risk
TFTP
COM/Script program infector
3. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some malware propagation techniques
Some firewall benefits
EXE program infector
The CIA triad
4. Confidentiality - integrity - availability
The CIA triad
Honeyd
Program infector
Vulnerabilities
5. The Practice of sending an ACK inside another packet going to the same destination
To close a TCP session
Ack Piggybacking
Router
Address resolution protocol
6. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Firewall
Parasitic malware
The network layer
Some Pen Test techniques
7. Wide Area Network - Larger than MAN or LAN - uses public network - phone lines - and leased lines to tie LAN and MAN over a dispersed area
WAN
Nmap
Worms
War Dialing
8. Attacks systems through known vulnerabilities - automatically scans for more systems to attack - lowers system defenses - installs rootkit or root shell - opens up back doors - self contained malware that can copy itself
Multi protocol label switching
Arbitrary substitution
Worms
Some types of malicious code
9. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
To establish a TCP session
A netmask
IDS
Switches
10. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
To establish a TCP session
Risk
Address resolution protocol
CIDR
11. Improper deployment can increase attack risk - if production systems aren't sufficiently protected - they can be vulnerable from a honeypot - legal liability
Rootkit
Types of viruses
Some disadvantages of honeypots
Checksum in UDP
12. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
Some ways to bypass firewall protections
The protected enclave to defense in depth
Some other UDP based protocols
Anomaly analysis work
13. The practice of sending an ACK inside another packet going to the same destination
Nmap scanning techniques
Some external threat concerns
ACK piggybacking
What primary threats should be protected against
14. Trivial File Transfer Protocol - method to transfer files from one device to another without needing authentication
Alteration of code
Social engineering
TFTP
Snort
15. Outside attack from network - Outsider attack from telephone - Insider attack from local network - insider attack from local system - attack from malicious code
The OSI model
Router
The five threat vectors
The presentation layer
16. True positive - false positive - true negative - false negative
Buffer overflow
The four types of events reported by IDS
The CIA triad
File Integrity checking work
17. Allows admins to remotely access a system for troubleshooting. - E.g VNC - GoToMyPc - PC Anywhere
the application layer
Some firewall challenges
HIDS monitor
Remote maintenance
18. Confidentiality - symmetric encryption
A netcat listener
The goals of cryptography
The four basic approaches to defense in depth
Address resolution protocol
19. A cracking tool inserted into the OS that allows the attacker to do as they please.
Rootkit
What range is a class B network?
Multi protocol label switching
COM/Script program infector
20. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
NIDS challenges
Plaintext
Some network design objectives
Vulnerabilities
21. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
ATM work
The Information Centric defense in depth
Overview of TCP
The Uniform Protection to defense in depth
22. NTP - BootP/DHCP - NFS file systems - SNMP - TFTP
Some other UDP based protocols
What ways should the crypto key be protected?
Trojan horse
The five threat vectors
23. local area network - small network confined to small location - all equipment owned by a single entity - vulnerable to inside threats and logic bombs
The data link layer
NIDS advantages
LAN
Some external threat concerns
24. Maintains complete TCP connection state and sequencing through 2 connections - address translation built-in by virtue of second connection above
Some types of malicious code
What's a VLAN
Proxy or application gateway
Total cell size for asynchronous transfer mode (ATM)
25. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
What range is a class A network?
Log monitoring work?
Some firewall challenges
A netcat listener
26. 1.0.0.0 through 127.255.255.255 - subnet mask starts at 255.0.0.0
Some firewall benefits
The protected enclave to defense in depth
What range is a class A network?
Alteration of code
27. Trying to ID modems in a telephone exchange that may be susceptible to compromise
When implementing protocols - what stack should be used?
War Dialing
Some disadvantages of honeypots
TFTP
28. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
When implementing protocols - what stack should be used?
IDS data normalization
Hping
Stateless packet filter
29. A time of check/time of use attack that exploits the difference in between when a security control was applied and the time the service was used.
Risk
Race conditions
IDS
File Integrity checking work
30. Protected at rest - protected in transit - secure the key
What ways should the crypto key be protected?
The goals of cryptography
Parasitic malware
When talking about protocols and referencing layers - what stack is used
31. 1. physical 2. data 3. network 4. transport 5. session 6. presentation 7. application
NIDS advantages
The different cable categories
PAN
The OSI Protocol Stack
32. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
The OSI model
Multi protocol label switching
Switches
TFTP
33. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
LAN
Honeyd
Some network design objectives
Anomaly analysis work
34. Confidentiality - integrity - availability
The presentation layer
The three goals of security
Some malware capabilities
Address Resolution Protocol (ARP)
35. An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target.
Deep packet inspection
Port scan
Ciphertext
DDoS attack
36. Protocol for mapping an IP address to a physical machine address that is recognized on the local network - A table - usually called the ARP cache - is used to maintain a correlation between each MAC and it's corresponding IP address
Address Resolution Protocol (ARP)
The five threat vectors
Switches
Trap door
37. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
HIDS monitor
Bus Topology
What range is a class A network?
CIDR
38. 192.0.0.0 through 223.255.255.255 - subnet mask of 255.255.255.0
The protected enclave to defense in depth
Trojan horse
What range is a class C network?
The goals of cryptography
39. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
The Information Centric defense in depth
Some external threat concerns
Denial of service
Internet
40. keeps the same letters - but changes the position within the text - easy to break - can be combined with substitution
The Uniform Protection to defense in depth
Permutation
Group
Some NIDS topology limitations
41. -Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose custom
Some external threat concerns
Ack Piggybacking
Switches
UDP packet headers
42. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
IDS not
The different cable categories
What range is a class A network?
Rotation?
43. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
The difference in stacks
COM/Script program infector
Stateless packet filter
War Dialing
44. Allows segmentation of a switch into different networks - regardless of where a system is plugged in - creates separate networks through software not hardware
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. Uniform protection - protected enclaves - information centric - threat vector analysis
What's a VLAN
Some malware capabilities
Browsing attack
The four basic approaches to defense in depth
46. rules indicate criteria in packets that represent events of interest - rules are applied to packets as they are received - alerts are created when matches are found
Integrity of Data
Some firewall benefits
EXE program infector
IDS signature analysis work
47. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Hubs
Ack Piggybacking
WAN
Nmap scanning techniques
48. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Permutation
Deep packet inspection
Some FTP dangers
Total cell size for asynchronous transfer mode (ATM)
49. Provides insight into the tactics - motives - and attacker tools
EXE program infector
Rootkit
Some honeypot advantages
Some Pen Test techniques
50. TCP/IP - the IP protoco - The core routing protocol of the internet - - deals with transmission of packets between end points - defines the addressing scheme for the internet
Trojan horse
Multi protocol label switching
When implementing protocols - what stack should be used?
Asynchronous Transfer Mode