ANSWER ALL QUESTIONS IN THIS SECTION
QUESTION 1
What is the TCP/IP model? - ANSWERS-Four layers
- Network Layer
- Internet Layer
- Transport Layer
- Application layer
QUESTION 2
What is the OSI model? - ANSWERS-- Physical layer 1
- Data link layer 2
- Network Layer 3
- Transport Layer 4
- Session Layer 5
- Presentation Layer 6
- Application Layer 7
END OF
PAGE 1
, SANS GISCP AND GIAC EXAM 2024
QUESTION 3
Address Resolution Protocol (ARP) - ANSWERS-Protocol for mapping an IP
address to a physical machine address that is recognized on the local network
QUESTION 4
A table, usually called the ARP cache, is used to maintain a correlation between
each MAC and it's corresponding IP address
QUESTION 5
ACK piggybacking - ANSWERS-The practice of sending an ACK inside another
packet going to the same destination
QUESTION 6
3-way handshake - ANSWERS-A sends a SYN packet to B
B acknowledges with a SYN/ACK
A replies with ACK
END OF
PAGE 2
, SANS GISCP AND GIAC EXAM 2024
QUESTION 7
What is permutation? - ANSWERS-- keeps the same letters, but changes the
position within the text
- easy to break
- can be combined with substitution
QUESTION 8
What is rotation? - ANSWERS-- uses a 1 to 1 substitution of characters
- rotate the alphabet by 'n' number of characters
- rot+X means rotate the letters X characters
QUESTION 9
What is arbitrary substitution? - ANSWERS-- Uses a 1 to 1 substitution of
arbitrary numbers
- given a one character mapping, you cannot determine the key
END OF
PAGE 3
, SANS GISCP AND GIAC EXAM 2024
QUESTION 10
What are the goals of cryptography? - ANSWERS-Confidentiality
- symmetric encryption
Integrity of Data
- hash
Authentication
- asymmetric
non repudiation
- digital signature
* hash + asymmetry
QUESTION 11
What ways should the crypto key be protected? - ANSWERS-- protected at rest
- protected in transit
- secure the key
END OF
PAGE 4