SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
GIAC
Start Test
Study First
Subjects
:
certifications
,
giac
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Free linux WLAN analysis tool - completely passive - cannot be detected - supports advanced GPS integration and mapping features - used for wardriving - WLAN vulerability assessment
Group
Permutation
What range is a class C network?
Kismet
2. Combines the functionality of a hub and bride into a single device - keeps track of MACs attached to each port
The three goals of security
Hubs
Switches
NIDS advantages
3. Prepends to the beginning of the file and gains control when the first instruction of the infected COM file is executed - appending to the end - virus writes its payload to the end and inserts jump instruction as the first instruction - which execute
Asynchronous Transfer Mode
Router
SYN flood
COM/Script program infector
4. Going around with equipment to detect wireless networks
Ack Piggybacking
What range is a class C network?
Wardriving
IDS data normalization
5. Personal area network - phone tethering - bluetooth - etc
PAN
Best way to protect wireless networks
The five threat vectors
Some reasons to use TCP over UDP
6. A cracking tool inserted into the OS that allows the attacker to do as they please.
What categories do vulnerabilities fall into?
Rootkit
EXE program infector
Address resolution protocol
7. One is for talking - one is for implementing
The difference in stacks
Honeypot
ACK piggybacking
Some NIDS topology limitations
8. Protects internal/external systems from attack - filters communications based on content - performs NAT - encrypts communications for VPN - logging to aid in intrusion detection
Some firewall benefits
The CIA triad
Some honeypot advantages
The session layer
9. Network traffic to the host - typically listens on all interface - uses signature analysis to identify events of interest
ATM work
HIDS monitor
Race conditions
TFTP
10. Most commonly used transport protocol today - ensures reliable packet delivery - has error handling built in
Shallow packet inspection
What range is a class B network?
Some honeypot advantages
Overview of TCP
11. Uses a 1 to 1 substitution of characters - rotate the alphabet by 'n' number of characters - rot+X means rotate the letters X characters
Rotation?
When talking about protocols and referencing layers - what stack is used
Social engineering
The network layer
12. Handles transmissions across the physical media like wires - fiber - etc
The physical layer stack
Log monitoring work?
Kismet
The CIA triad
13. Considered to be a perimeter device
Smurf attack
Router
SYN flood
Some Pen Test techniques
14. Application layer attacks may get through - dialup - VPN - extranet connections may bypass firewalls
Some firewall challenges
Stateless packet filter
The four types of events reported by IDS
Some ways to bypass firewall protections
15. Uses a 1 to 1 substitution of arbitrary numbers - given a one character mapping - you cannot determine the key
Arbitrary substitution
What's an easy way to test encryption?
Kismet
Wardriving
16. Parasitic malware - boot record infector - macro - COM/Script program infector - EXE program infector
Types of viruses
Kismet
HIDS monitor
Some other UDP based protocols
17. Strips OS commands and characters from input - avoid making system calls from within the app * especially based on user input
Boot record infector
ACK piggybacking
Switches
OS Command Injection defenses
18. Trying to ID modems in a telephone exchange that may be susceptible to compromise
The threat vector analysis in defense in depth
What range is a class C network?
Plaintext
War Dialing
19. Isolates systems when they initially connect to the network - allows systems to be scanned and checked prior to being put on a trusted segment
NAC
IDS signature analysis work
Stateful firewall
Bridge
20. CIDR is a shorthand way of specifying which portion of the address is the network - and which portion is the host
Some FTP dangers
IDS data normalization
CIDR
The Uniform Protection to defense in depth
21. Attaches itself to existing program files and activated when the exe is launched
NIDS challenges
SQL Slammer Worm
Defense in depth
Program infector
22. Not frequently seen on LANs because of expense - because of its traffic predictability and high bandwidth support - it's good for video streaming - encapsulates common protocols - uses virtual path identifiers to create end to end connectivity - has
Asynchronous Transfer Mode
Deep packet inspection
Social engineering
Trap door
23. Connects the physical part of the network (cables) with the abstract (packets and datastreams)
The data link layer
The four types of events reported by IDS
What primary threats should be protected against
When talking about protocols and referencing layers - what stack is used
24. deployment challenges including topology and access limitations - analyzing encrypted traffic - quantity vs. quality of signatures - performance limitations with extensive analysis techniques - very costly for proper management
Smurf attack
ACK piggybacking
NIDS challenges
Some reasons to use TCP over UDP
25. Work groups that require additional protection are segmented from the rest of the internal organization - restricting access to critical segments - system of VPNs - internal firewall - VLANs and ACLs
Datagram length of a UDP packet
The protected enclave to defense in depth
Race conditions
To close a TCP session
26. An attempt to gain access by bombarding it with guesses until the password is found.
Bus Topology
Address resolution protocol
Switches
Brute force
27. Protected at rest - protected in transit - secure the key
The Uniform Protection to defense in depth
What ways should the crypto key be protected?
NAC
The different cable categories
28. Provides insight into traffic on the network - help detect problems with network operations - provides auditing for other security measures
NIDS advantages
Some types of malicious code
Some reasons to use UDP over TCP
The goals of cryptography
29. It handles the establishment and maintenance of connections between systems
Total cell size for asynchronous transfer mode (ATM)
The session layer
IDS signature analysis work
Smurf attack
30. A list of files is defined that should be monitored for a change - HIDS software calculates a one-way hash for each file - if a change is made to the file - the hash is changed
The conficker worm
Some common UDP ports
A netcat listener
File integrity checking work
31. Physical layer - Data link layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
Trojan horse
Snort
NIDS advantages
The OSI model
32. low interaction production honeypot - network daemon that can simulate other hosts - each host can appear as a different OS
Honeyd
Kismet
LAN
CIDR
33. Switches networks make it difficult to monitor traffic in promiscuous mode - topology must be able to support traffic aggregation for monitoring
Ciphertext
Boot record infector
Some NIDS topology limitations
Honeypot
34. A sends a SYN packet to B - B acknowledges with a SYN/ACK - A replies with ACK
IDS signature analysis work
Hubs
Some disadvantages of honeypots
3-way handshake
35. It interacts with the application layer to determine which network services will be required
Types of viruses
COM/Script program infector
the application layer
The five threat vectors
36. Used by IDS for a baseline before analysis - attackers will try to de-normalize traffic to evade detection - IDS will normalize data for understood protocols
IDS data normalization
Race conditions
Checksum in UDP
IDS
37. Weakness in a system - inherent in a complex system - majority are due to poor coding - gateway by which threats are manifested
Vulnerabilities
What primary threats should be protected against
When implementing protocols - what stack should be used?
To close a TCP session
38. Full open - half open (stealth scan) - UDP - Ping
Some ways to bypass firewall protections
Nmap scanning techniques
The data link layer
Honeyd
39. Infects MBR - no network spreading potential
Boot record infector
Some reasons to use TCP over UDP
Some FTP dangers
Some NIDS topology limitations
40. fast - with little fidelity - examines header information and limited payload data
IDS signature analysis work
When talking about protocols and referencing layers - what stack is used
Shallow packet inspection
The OSI Protocol Stack
41. Confidentiality - symmetric encryption
File Integrity checking work
The goals of cryptography
Network stumbler
HIDS monitor
42. An appliance that controls access between public internet and a companies private network - or between a PC NIC and the rest of the PC.
Worms
NIDS advantages
Firewall
Switches
43. Good for multimedia - can use small single packets - multicasting is required - speed is the highest priority
Some Pen Test techniques
Switches
Some reasons to use UDP over TCP
PAN
44. Small program triggered by an event that provides an action. E.g. scheduled file removal if countdown isn't reset - ie: employee was fired
Logic bomb
Integrity of Data
Some network design objectives
Race conditions
45. Provides insight into the tactics - motives - and attacker tools
Datagram length of a UDP packet
Some honeypot advantages
Rotation?
MAN
46. Simplest form of a research honeypot - useful in identifying nature of TCP scans - allows attacker to complete 3-way handshake - listens on a defined port - logs incoming requests for analysis
MAN
Multi protocol label switching
Rotation?
A netcat listener
47. Replicates traffic onto all ports - no traffic monitoring - cannot control which ports should or shouldn't receive frames - forming a large collision domain.
Race conditions
Hubs
The three goals of security
Some reasons to use UDP over TCP
48. 53 - DNS - 67 - BootP - 68 - BootP - 69 - TFTP - 123- NTP - 137-139 NBT - 161 - SNMP - 162 - SNMP - 2049 - NFS
Some common UDP ports
A netcat listener
Ciphertext
EXE program infector
49. Slow - requires stateful data tracking - inspects all fields - including variable-length fields
Deep packet inspection
What threats should be protected against - based on threat levels
Some honeypot advantages
Anomaly analysis work
50. logic bomb - trojan horse - trap door
What range is a class C network?
Some types of malicious code
To close a TCP session
ACK piggybacking
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests