march geekness

36
March Geekness March 9, 2010 Only one team will prevail. Who will be the winner? 7DA

Upload: rinky25

Post on 14-Jan-2015

371 views

Category:

Education


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: March Geekness

March Geekness March 9, 2010

Only one team will prevail. Who will be the winner?

7DA

Page 2: March Geekness

How March Geekness Works• On Tuesday March 9, 12-1:30 PM in the Vendor Expo, pick up your entry

card, it has ten questions similar to the ones we will be asking in the contest. Submit your answers by end of lunch session in drop box at entry table.

• SANS reviews all entries. Tuesday March 9, 5 PM: the name of everyone who qualifies will be posted in the Vendor Expo. From the qualifiers, form your teams. A max of five persons on a team, a min of three.

• Space is Limited. We can accommodate a max of sixteen teams first come, first served

• No debate is allowed about whether the answer is right, however the *source* of the question is displayed on the slide and lifelines are allowed

• Short elimination rounds to develop the F1nal F0urF1nal F0ur

Page 3: March Geekness

Elimination RoundsRULES:• 10 Questions• 2 Teams compete• Question is displayed• Team has to raise a flag to answer• Referee calls on the team: five seconds to begin answer, time delay = wrong answer• If no one knows the answer, the question remains in play until the last question is

answered. Teams can send a runner, or use a lifeline to find the answer. Do NOT interrupt someone speaking, but use CSMA/CD and raise your flag during any period of silence

• Right answer = 1 point• Wrong answer deducts 1 point• Partial credit is possible .5 point• Tiebreaker question in case of tie at the end of 10 questions

Page 4: March Geekness

Elimination Rounds (2)

• In the case of an odd number of teams, referee may elect to advance to next round by presenting 10 questions, requiring an answer in five seconds, and 6 out of 10 is a pass

• Referee’s choice as to which team is selected as odd team out.

Page 5: March Geekness

F1nal F0urSANS

7DA

Page 6: March Geekness

F1nal F0ur Elimination Rounds

• All elimination rules apply• 20 Questions instead of 10• Repeat questions are allowed

Page 7: March Geekness

Geeks Know How to Have Fun

• March “Geekness” is all about fun. Participation will be limited, but even the casual observer can learn and benefit

• Hosted by Stephen Northcutt and special guests

• Food & Drink brought to you by SANS and Sponsoring Exhibitors

• Prizes!

Page 8: March Geekness

Prizes!

A big pile of snow (just kidding)

Page 9: March Geekness

Prize for each Team member(8) Elimination Round Survivors

I survived an elimination round

at SANS 2010

March Geekness

Commemorative T shirt, different color for each team

Page 10: March Geekness

Prize for each Team member - First Runner Up -

Each member of the First Runner Up team will receive a 5.11 Tactical Ready Bag, a practical carry-all with water bottle pocket, thermos/flashlight pockets, and an internal organizer panel in the lid.

Page 11: March Geekness

Prize for each Team member - Winning Team -

AIRVIEW2-EXT 2.4GHz Spectrum Analyzer

Page 12: March Geekness

QuestionsHint: Answers to many "March Geekness” questions can be found by engaging with exhibitors at the Expo. We encourage you to meet them!

Page 13: March Geekness

What is the name of Palo Alto Networks centralized management capability for managing policies across distributed firewalls?

Sample Question

March Geekness 7DA

v14s5

Page 14: March Geekness

By what percent have malware threats increased between 2006 and 2008?

Sample Question

March Geekness 7DA

v3s6

Page 15: March Geekness

Why does LogRhythm keep metadata in a separate database from raw log data?

Sample Question

March Geekness 7DA

v11s4

Page 16: March Geekness

Does Sunbelt Software CWSandbox require or use virtualization?

Sample Question

March Geekness 7DA

v21s1

Page 17: March Geekness

What is the name of the company that Cisco acquired that is the market leader in SaaS Web security?

Sample Question

March Geekness 7DA

v8s2

Page 18: March Geekness

Name an agent used by the Web Application testing vector.

Sample Question

March Geekness 7DA

v9s7

Page 19: March Geekness

From Screen MMLS output:

A) dd if=disk1.dd bs=512 skip=63 count=1028097 of=windows.disk1.ddB) dd if=disk1.dd of=windows.disk1.dd start=1028159 count=1028097C) dd if=disk1.dd bs=512 skip=1028159 count=1028097 of=windows.disk1.ddD) dd if=disk1.dd start=62 count=1028097 of=windows.disk1.dd

g.147.

Sample Question

March Geekness 7DA

Page 20: March Geekness

What is the largest number of events currently being captured by LogCenter on a daily basis?

Sample Question

March Geekness 7DA

v10s3

Page 21: March Geekness

GPEN

You are pen testing a Windows system remotely via a raw netcat shell. You want to get a listing of all the local users on the system, what command would you use?

A) net name B) net userC) net accountD) net localuser

Sample Question

March Geekness 7DA

g.95.

Page 22: March Geekness

Do all SecureDoc users have the same privileges?

Sample Question

March Geekness 7DA

v23s2

Page 23: March Geekness

What are two architectural requirements of supporting content awareness in SIEM?

Sample Question

March Geekness 7DA

v12s2

Page 24: March Geekness

What is Norman best known for worldwide?

Sample Question

March Geekness 7DA

v13s1

Page 25: March Geekness

Why is recovering the content of a deleted file from a FAT file system difficult?

A) The first letter of the file name is overwritten with the character 0xE5B) The contents of the file are overwrittenC) The entries in the file allocation table are overwrittenD) The directory entry is overwritten

Sample Question

March Geekness 7DA

g.159.

Page 26: March Geekness

Can Splunk searches support real-time streamed data?

Sample Question

March Geekness 7DA

v20s3

Page 27: March Geekness

Is QualysGuard host-based or network-based?

Sample Question

March Geekness 7DA

v15s4

Page 28: March Geekness

GPEN

What is the reason that Cain cannot crack Linux MD5 passwords?

A) Cain does not support salted Unix password representations B) Unix MD5 hashes are not the same as Windows MD5 hashes C) Cain cannot crack MD5 passwords D) Cain only runs on Windows and cannot read a Unix password file

g.47.

Sample Question

March Geekness 7DA

Page 29: March Geekness

How does CDI know its unit in the field is alive and working?

Sample Question

March Geekness 7DA

v6s7

Page 30: March Geekness

Sourcefire can help you reduce the number of actionable events you have to pursue by what percentage?

Sample Question

March Geekness 7DA

v19s7

Page 31: March Geekness

In case of a security violation, what are the response mechanisms available on the Barracuda WAF?

Sample Question

March Geekness 7DA

v2s3

Page 32: March Geekness

In which Firefox version did the SQLite format begin to be used for storing browser artifacts?

A) Firefox 3.0B) Firefox 1.5C) Firefox 2.0D) Firefox 3.5

g.135.

Sample Question

March Geekness 7DA

Page 33: March Geekness

According to McAfee what percentage of power plant operators reported that their networks had been infiltrated?

Sample Question

March Geekness 7DA

v5s1

Page 34: March Geekness

What is Websense Security Labs?

Sample Question

March Geekness 7DA

v22s3

Page 35: March Geekness

What is Solera Networks’ unique approach to full packet capture?

Sample Question

March Geekness 7DA

v18s5

Page 36: March Geekness

You are responding to a Windows Vista SP2 32-bit operating system. The machine has 4-GB of RAM installed. You are asked to acquire memory following the order of volatility while maintaining the most forensically sound process. What is the least invasive way to image memory and what is the resultant size of your memory image?

A) Use a memory imaging tool from a CDROM and image to a plugged in USB key:Total memory image = 4 GBB) Use a memory imaging tool from a USB key and image to the same USB key: Total memory image = 3 GBC) Use a memory imaging tool from a USB key and image to a network share:Total memory image = 4 GBD) Use a memory imaging tool from a CDROM and image to a networ'k share: Total memory image = 3 GB

g.144. Sample

Question

March Geekness 7DA