Republished with permission from WatchGuard Technologies, Inc.


Put Your Security Skills to the Test

By Lisa Phifer, Vice-President, Core Competence

Over the years, WatchGuard's LiveSecurity columnists have put together a treasure trove of juicy tidbits, meaty primers, and hot tips covering many aspects of network and system security. From locking down VPNs and mobile devices to hardening firewalls, servers, and workstations, LiveSecurity has a little something for everyone. Think you already know it all? Exercise those cerebral cells by answering the following questions, drawn from the LiveSecurity archive.

1. What do you call an attack against networked computers that combines malicious code with exploitation of server vulnerabilities in order to start and spread?

a) A Nastygram
b) A Trojan Horse
c) A worm
d) A blended threat
View Answer

2. Stack attacks, format string attacks, and heap attacks are three forms of what?

a) Denial of Service
b) Buffer overflow
c) Web application exploits
d) Sloppy programming
View Answer

3. Which of the following is NOT true about security tokens?

a) Tokens are hardware devices
b) Tokens may have a keypad
c) Tokens often display one-time-passwords
d) Tokens are used for multi-factor authentication
View Answer

4. What do you call threats that lurk inside shareware programs, Web pages, and e-mail messages, posing as something purposeful while reporting information about you to others?

a) Easter Eggs
b) Cookies
c) Spam
d) Spyware
View Answer

5. Which of the following is NOT a wireless security mechanism?

a) WEP
b) WAP
c) WPA
d) WPA2
View Answer

6. Secret key cryptography is also known by which name?

a) Asymmetric crypto
b) Symmetric crypto
c) Private key crypto
d) Simple key crypto
View Answer

7. A method that VPN peers use to obtain the same keying material for encryption and authentication without ever exchanging the entirety of any keying material is called:

a) RSA
b) Diffie-Hellman
c) Main Mode
d) Pre-Shared Secrets
View Answer

8. Which of the following is NOT a threat against mobile devices?

a) Cabir
b) Brador
c) Mosquitos
d) Bill Gates
View Answer

9. A Realtime Black Hole List is:

a) The federal budget deficit
b) A device deployed to lure attackers
c) A database used to block unwanted e-mail
d) A default firewall rule
View Answer

10. The binary value "01101110" is what in hexadecimal?

a) 110
b) 6E
c) 111
d) 6F
View Answer

11. A Split DNS is:

a) A splitting headache
b) A broken domain name server
c) A DNS with a backup and primary
d) A DNS that separates public and private addresses
View Answer

12. A popular open-source, signature-based Network Intrusion Detection System is:

a) Sniff
b) Snarf
c) Snort
d) Snoop
View Answer


1: D.
To learn more about malware that combines viruses, worms, and other malicious code with vulnerability exploits, read "Terminating Blended Threats."

2: B.
To understand how these and other buffer overflow attacks do their dirty work, read "Foundations: What Are Buffer Overflows?"

3: A.
As explained in "Security Tokens: Why Aren't You Using Them?" tokens are frequently sold as hardware (e. g., a keyfob, pinpad, or USB stick) but are also available as software (e. g., to turn your PDA into a token).

4: D.
I must be hungry. Of course the answer is spyware. For a cautionary tale of the many ways in which spyware can be delivered to your PC, see "Foundations: How Does Spyware Get onto My Computer?"

5: B.
WAP stands for Wireless Access Point, which does not imply any particular level of security. Learn more about some of the security issues related to WAPs in "Ouch! Even a PDA Hurts When It WAPs You," and "Tools and Tactics for Safer WLAN Deployment."

6: B.
No, the answer is not private key (the better half of public key crypto). Secret key crypto is "symmetric" because both the sender and the receiver use the same key. If you missed this one, refresh your memory with "Foundations: Cryptography 101."

7: B.
Diffie-Hellman, Main Mode, and Pre-Shared Secrets are all used in IPsec VPNs, but only Diffie-Hellman is a key exchange protocol. See "Choosing Security Parameters for Site-to-Site VPNs."

8: D.
Cabir, Bradoor, and Mosquitos are Smartphone worms and trojans released in the summer of 2004. To learn how to protect mobile phones, read "Smartphone (In)Security."

9: C.
If your mail server is being overrun with spam, learn about how RBLs can help you defeat this plague. Read, "Can Spam Escape a Black Hole?"

10: B.
If math class made you snore, "Understanding IP Addresses and Binary" can catch you up on the binary essentials that you missed -- or have just forgotten.

11: D.
David Bonn describes the trials, tribulations, and benefits of hosted DNS in "Outsourcing DNS: For Once, Laziness Wins."

12: C.
While this program may sniff and snoop and occasionally snarf, the one and only NIDS represented by a little pink pig is Snort. Learn why in "Sniffing Out Snoopers with Snort."

Rate your Security IQ

  • 0-3 correct: n00b. That thing in your hand is called a mouse. Use it to click on LiveSecurity links!
  • 4-7 correct: Professional. But you might want to bone up on Foundations
  • 8-10 correct: Power User. Above average! You've been reading, haven't you?
  • 11-12 correct: L33t H@x0r. We're relieved you use your power for good!

To Learn More:

LiveSecurity Topical Index

LiveSecurity Glossary

    Copyrightę 2005, WatchGuard Technologies, Inc. All rights reserved. WatchGuard, LiveSecurity, Firebox and ServerLock are trademarks or registered trademarks of WatchGuard Technologies, Inc. in the United States and other countries.