SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. War dialing - war driving - Sniffing - eavesdropping - dumpster diving - social engineering
Some Pen Test techniques
UDP packet headers
Rotation?
Some malware propagation techniques
2. A TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously
The different cable categories
Some other UDP based protocols
Total cell size for asynchronous transfer mode (ATM)
Hping
3. Identify critical assets and provide layered protection - data is accessed by applications - applications reside on hosts - hosts operate on networks
Address resolution protocol
Snort
The Information Centric defense in depth
Stateless packet filter
4. Switches along the path can be requested to allocate the desired amount of bandwidth. If the circuit has the required bandwidth - the circuit is set up.
Browsing attack
When setting up a virtual circuit
NIDS advantages
Multi protocol label switching
5. Full open - half open (stealth scan) - UDP - Ping
Anomaly analysis work
Types of viruses
Nmap scanning techniques
Snort
6. Attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside
Shallow packet inspection
Wardriving
Multi protocol label switching
Social engineering
7. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
The OSI model
IDS data normalization
Some disadvantages of honeypots
The goals of cryptography
8. Netmasks or subnets provide a method for identifying what portion of an address is the network - and what portion is the host
A netmask
Some ways to bypass firewall protections
IDS data normalization
IDS
9. Worms and Wireless - modems - tunnel anything through HTTP - social engineering
What ways should the crypto key be protected?
What range is a class A network?
Some ways to bypass firewall protections
Types of ATM virtual circuits
10. destruction of data - leaking confidential information - providing backdoor access
Some malware capabilities
Bridge
The Uniform Protection to defense in depth
Rootkit
11. It interacts with data and prepares it to be transmitted across the network. It ensures reliable connectivity from end-to-end
Some firewall benefits
The transport layer
NIDS advantages
The TCP/IP model
12. Malware - insider threat - natural disaster - terrorism - pandemic
What primary threats should be protected against
CIDR
No State Inspection ACK flag set
When implementing protocols - what stack should be used?
13. Metropolitan area network - spans across city or town - larger than a LAN - uses fiber for backbone
MAN
WAN
Snort
IDS
14. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
CIDR
File integrity checking work
Some reasons to use UDP over TCP
IDS
15. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
Firewall
EXE program infector
NIDS advantages
Port scan
16. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Stateless packet filter
IDS signature analysis work
Deep packet inspection
Some reasons to use UDP over TCP
17. A spoofed IP is used to send a SYN to the target. It then responds with a SYN/ACK that never receives the final ACK to complete the handshake. This occupies a portion of the target's pre-established buffer for TCP and can prevent the target from acce
What's a VLAN
Datagram length of a UDP packet
Alteration of code
SYN flood
18. Network scanner.
the application layer
What range is a class C network?
The CIA triad
Nmap
19. FIN 130 - ACK 131 - FIN 570 - ACK 571
To close a TCP session
The three goals of security
The protected enclave to defense in depth
the application layer
20. Going around with equipment to detect wireless networks
Wardriving
Program infector
Some firewall benefits
Firewall
21. 128.0.0.0 through 191.255.255.255 - with a subnet mask of 255.255.0.0
HIDS monitor
The conficker worm
What range is a class B network?
Defense in depth
22. removable media - email attachments - web browsing - social networking - network vulnerabilities - IM applications - p2p
COM/Script program infector
What's an easy way to test encryption?
The data link layer
Some malware propagation techniques
23. Simple attack done by simply browsing available information that's allowed on a local network.
The difference in stacks
Some network design objectives
Browsing attack
Some reasons to use UDP over TCP
24. Connection oriented - before systems can communicate over an ATM network - they must establish a virtual circuit between each other - this can span across multiple ATM switches that also handle communications for other systems - at the end of the con
Address resolution protocol
Worms
ATM work
When setting up a virtual circuit
25. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Port scan
NIDS advantages
Logic bomb
UDP packet headers
26. 8 bytes per packet - UDP SRC port - UDP DST Ports - UDP length - UDP Checksum
When implementing protocols - what stack should be used?
UDP packet headers
Address Resolution Protocol (ARP)
IDS
27. Considered to be a perimeter device
NIDS challenges
What primary threats should be protected against
Smurf attack
Router
28. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Ciphertext
The TCP/IP model
COM/Script program infector
Browsing attack
29. Relies on executable code insertion and user interaction to spread
A netmask
Parasitic malware
Permutation
the application layer
30. Bits of code embedded in programs to quickly gain access at a later time
The three goals of security
Race conditions
Some firewall challenges
Trap door
31. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
A netcat listener
Kismet
Some firewall benefits
The four types of events reported by IDS
32. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Permutation
Program infector
Rotation?
Types of viruses
33. An FTP that allows downloads only if the user knows the exact name of the file they're looking for
A blind FTP
Proxy or application gateway
Alteration of code
Snort
34. Handles the network address scheme and connectivity of multiple network segments. It handles communication.
LAN
The network layer
Kismet
Plaintext
35. Very simplistic. All systems are attached to the same cable segment. Rarely used because they're unreliable - low fault tolerance - poor traffic isolation - with limited scalability
Bus Topology
The different cable categories
Rootkit
The presentation layer
36. UDP based infection - infected through vulnerability in SQL server - caused DoS on saturated networks
Wardriving
SQL Slammer Worm
CIDR
Some malware propagation techniques
37. flags anomalous conditions in traffic on the network - requires understanding on what is normal - bases good traffic as a baseline
Social engineering
Anomaly analysis work
NIDS advantages
ATM work
38. 1 and 2 - Voice/Low speed data - 3 - Voice/Data 10Mb - 4 - Voice/Data 16Mb - 5 - 5e - Voice/Data 100Mb to 1Gb - 6 - Standard for gigabit
Buffer overflow
Some types of malicious code
The different cable categories
Some malware capabilities
39. Attaches itself to existing program files and activated when the exe is launched
Stateful firewall
Group
Program infector
Honeyd
40. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
SYN flood
Switches
Bus Topology
Some common UDP ports
41. Confidentiality - integrity - availability
The session layer
Trojan horse
Nmap scanning techniques
The CIA triad
42. A hash is produced when applied to a monitored file. The hash always generates the same value unless a change was made. HIDS software checks the hashes of monitored files and if a change is found - analyst is notified. - ie: tripwire
LAN
Some ways to bypass firewall protections
File Integrity checking work
What primary threats should be protected against
43. An attempt to gain access by bombarding it with guesses until the password is found.
What range is a class A network?
COM/Script program infector
Brute force
The three goals of security
44. An attacker spoofs the victim's IP and sends an ICMP ECHO request to the broadcast address of a network. When every system responds - a DoS occurs.
SQL Slammer Worm
Plaintext
Smurf attack
A blind FTP
45. Infected millions through various methods - vulnerability in the MS Server Service - brute force admin password through network shares - infect removable devices with a malicious autorun script
Some reasons to use UDP over TCP
Worms
The conficker worm
Firewall
46. It allows the transport layer to detect when the UDP headers or the payload have been modified in transit
The session layer
Best way to protect wireless networks
CIDR
Checksum in UDP
47. When someone has compromised the integrity of data or a program. Allows attackers to create backdoors.
The data link layer
Alteration of code
LAN
Wardriving
48. It interacts with the application layer to determine which network services will be required
The conficker worm
What's a VLAN
Overview of TCP
the application layer
49. It makes sure the data sent from one side to the other is in a format useful to the other side
Firewall
The presentation layer
Browsing attack
The Uniform Protection to defense in depth
50. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Parasitic malware
Permutation
MAN
Vulnerabilities