100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SANS GISCP and GIAC EXAM QUESTIONS & ANSWERS 100% CORRECT!!

Rating
-
Sold
-
Pages
51
Grade
A+
Uploaded on
10-12-2024
Written in
2024/2025

Ack Piggybacking - ANSWERSThe Practice of sending an ACK inside another packet going to the same destination Address resolution protocol - ANSWERSProtocol for mapping an IP address to a physical machine address that is recognized on the local network. A table, usually called the ARP cache, is used to maintain a correlation between each MAC and its corresponding IP address What are the five threat vectors? - ANSWERSOutside attack from network Outsider attack from telephone Insider attack from local network insider attack from local system attack from malicious code What are some external threat concerns? - ANSWERS-Malicious code might execute destructive overwrite to hard disks -Malicious mas mailing code might expose sensitive information to the internet - web server compromise might expose organization to ridicule - Web server compromise might expose customer private data What are some ways to bypass firewall protections? - ANSWERS- Worms and Wireless - modems - tunnel anything through HTTP - social engineering What is social engineering? - ANSWERS- attempt to manipulate or trick a person into providing information or access - bypass network security by exploiting humans - vector is often outside attack by telephone or visitor inside What is Hping? - ANSWERS- a TCP version of ping - sends custom TCP packets to a host and listens for replies - enables port scanning and spoofing simultaneously

Show more Read less
Institution
SANS GISCP And GIAC
Course
SANS GISCP and GIAC











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS GISCP and GIAC
Course
SANS GISCP and GIAC

Document information

Uploaded on
December 10, 2024
Number of pages
51
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS GISCP and GIAC EXAM
QUESTIONS & ANSWERS 100%
CORRECT!!
Ack Piggybacking - ANSWERSThe Practice of sending an ACK inside another packet
going to the same destination

Address resolution protocol - ANSWERSProtocol for mapping an IP address to a
physical machine address that is recognized on the local network.
A table, usually called the ARP cache, is used to maintain a correlation between each
MAC and its corresponding IP address

What are the five threat vectors? - ANSWERSOutside attack from network
Outsider attack from telephone
Insider attack from local network
insider attack from local system
attack from malicious code

What are some external threat concerns? - ANSWERS-Malicious code might execute
destructive overwrite to hard disks
-Malicious mas mailing code might expose sensitive information to the internet
- web server compromise might expose organization to ridicule
- Web server compromise might expose customer private data

What are some ways to bypass firewall protections? - ANSWERS- Worms and Wireless
- modems
- tunnel anything through HTTP
- social engineering

What is social engineering? - ANSWERS- attempt to manipulate or trick a person into
providing information or access
- bypass network security by exploiting humans
- vector is often outside attack by telephone or visitor inside

What is Hping? - ANSWERS- a TCP version of ping
- sends custom TCP packets to a host and listens for replies
- enables port scanning and spoofing simultaneously

What is a group? - ANSWERSA group means multiple iterations won't matter. If you
encrypt with a key, then re-encrypt, it's the same as using one key.

What is a port scan? - ANSWERS- common backdoor to open a port

,- port scan scans for open ports on remote host
- scans 0 - 65,535 twice. TCP and UDP

What is nmap? - ANSWERSNetwork scanner.

What are nmap scanning techniques? - ANSWERS- Full open
- half open (stealth scan)
- UDP
- Ping

What is network stumbler? - ANSWERS- free windows based wireless scanner for
802.1b
- detects access point settings
- supports GSP integration
- identifies networks as encrypted or unencrypted

What is Kismet? - ANSWERS- Free linux WLAN analysis tool
- completely passive, cannot be detected
- supports advanced GPS integration and mapping features
- used for wardriving, WLAN vulerability assessment

What is Wardriving? - ANSWERSGoing around with equipment to detect wireless
networks

What is War Dialing? - ANSWERS- trying to ID modems in a telephone exchange that
may be susceptible to compromise

What are some Pen Test techniques? - ANSWERS- War dialing
- war driving
- Sniffing
- eavesdropping
- dumpster diving
- social engineering

What is IDS? - ANSWERS- intrusion detection system
- it reports attacks against monitored systems/networks

What is IDS not? - ANSWERS- not a replacement for firewalls, hardening, strong
policies, or other DiD methods
- low maintenance
- inexpensive

What are the four types of events reported by IDS? - ANSWERS- true positive
- false positive
- true negative
- false negative

,How does IDS signature analysis work? - ANSWERS- rules indicate criteria in packets
that represent events of interest
- rules are applied to packets as they are received
- alerts are created when matches are found

How does anomaly analysis work? - ANSWERS- flags anomalous conditions in traffic
on the network
- requires understanding on what is normal
- bases good traffic as a baseline

What is deep packet inspection? - ANSWERS- slow, requires stateful data tracking
- inspects all fields, including variable-length fields

What is shallow packet inspection? - ANSWERS- fast, with little fidelity
- examines header information and limited payload data

What is Honeyd? - ANSWERS- low interaction production honeypot
- network daemon that can simulate other hosts
- each host can appear as a different OS

What is a netcat listener? - ANSWERS- simplest form of a research honeypot
- useful in identifying nature of TCP scans, allows attacker to complete 3-way
handshake
- listens on a defined port, logs incoming requests for analysis

What are some disadvantages of honeypots? - ANSWERS- improper deployment can
increase attack risk - if production systems aren't sufficiently protected, they can be
vulnerable from a honeypot
- legal liability

What are some honeypot advantages? - ANSWERS- provides insight into the tactics,
motives, and attacker tools

What is a honeypot? - ANSWERS- a system resource that has no legitimate purpose or
reason for someone to connect to it
- its purpose is to draw in attackers to understand how they break into a system

What is a proxy or application gateway? - ANSWERS- maintains complete TCP
connection state and sequencing through 2 connections
- address translation built-in by virtue of second connection above

What is a stateful firewall? - ANSWERSStateful firewalls maintain state of traffic flows

, What is No State Inspection ACK flag set? - ANSWERSpacket filter firewalls rely on
TCP flags to determine connection state. Attacker can send ACK packets only to
bypass firewall.

What is IDS data normalization? - ANSWERS- used by IDS for a baseline before
analysis
- attackers will try to de-normalize traffic to evade detection
- IDS will normalize data for understood protocols

What are NIDS advantages? - ANSWERS- provides insight into traffic on the network
- help detect problems with network operations
- provides auditing for other security measures

What are NIDS challenges? - ANSWERS- deployment challenges including topology
and access limitations
- analyzing encrypted traffic
- quantity vs. quality of signatures
- performance limitations with extensive analysis techniques
- very costly for proper management

What are some NIDS topology limitations? - ANSWERS- switches networks make it
difficult to monitor traffic in promiscuous mode
- topology must be able to support traffic aggregation for monitoring

What is Snort? - ANSWERS- open source tool for monitoring
- can be used as a NIDS
- has quick updates and flexibility for custom rules

What is a stateless packet filter? - ANSWERSA low end firewall that can quickly be
deployed using existing hardware. They examine packets themselves with no content.

What are some firewall benefits? - ANSWERS- protects internal/external systems from
attack
- filters communications based on content
- performs NAT
- encrypts communications for VPN
- logging to aid in intrusion detection

What are some firewall challenges? - ANSWERS- application layer attacks may get
through
- dialup, VPN, extranet connections may bypass firewalls

What is a firewall? - ANSWERSAn appliance that controls access between public
internet and a companies private network, or between a PC NIC and the rest of the PC.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
papersmaster01 Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
280
Member since
2 year
Number of followers
106
Documents
14075
Last sold
5 days ago
PAPERSMASTER01

On this page you will find documents , package deals, flashcards offered by seller PAPERSMASTER01.With our documents on your side you"ll be well equipped to tackle you exams and achieve the grades you need.

3.9

71 reviews

5
22
4
33
3
9
2
3
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions