IP Addresses
ARP and MAC Addresses
Routing & Attacks
Analog & Digital Communication
Cybersecurity Fundamentals
200

What is a Private IP address?

What cannot be directly accessed from the internet?

200

Protocol used to find a MAC address given an IP address on a local network. 

What is Address Resolution Protocol (ARP)?

200

The routing protocol known for finding the shortest path within a single Autonomous System.

What is OSPF?

200

This is a benefit of digital signals over analog signals.

What is relative noise immunity?

What is easier to process and store?

What is error detection and correction?

What is easier multiplexing?

200

The pillar of information assurance violated by unauthorized data modification

What is Integrity?

300

The total number of usable host addresses in a /26 subnet. 

What is 62?

300

The broadcast MAC address used in ARP requests.

What is FF:FF:FF:FF:FF:FF?

300

An attack where false routing information redirects traffic through an unauthorized host.

What is a Man-in-the-Middle attack?

300

Nyquist theorem states your sampling rate must be at least this multiple of the highest frequency in the signal.

What is two times?

e.g. 

fm(max) = 100 Hz

f(sampling) = 200 Hz

300

These criteria are IDEAL conditions for you to conduct a successful Buffer Overflow attack

- Executable file that allows for user input

- The executable file is owned by root

- The executable file that has the SETUID Flag set (i.e. rws - - x - - x).

600

Given an IP address of 192.168.50.1 and a subnet mask of /24, this is the network address.

What is 192.168.50.0? 

600

An attacker sends fraudulent ARP replies to associate their MAC address with another host's IP. This attack is called:

What is ARP Spoofing?

600

This type of routing protocol uses Autonomous Systems and is susceptible to wide-area MITM attacks.

What is BGP (Border Gateway Protocol)?

600

Increasing this component of an Analog-to-Digital Converter (ADC) reduces quantization noise. 

What is the number of bits (resolution)? 

600

This many bytes are allocated for this C program:

char[10] = "Navy";

int[3] = {10, 11, 12, 13};

float[2] = {3.14};

What are 30 bytes?

800

The highest assignable IP address to a host in the network 172.16.0.0/16.

What is 172.16.255.254?

800

ARP operates between these two layers in the TCP/IP model.

What are Network and Data-Link Layers?

800

One defensive measure to prevent unauthorized OSPF routing updates.

What is configuring passive interfaces?

AND

What are passwords?

800

A digital modulation method where amplitude and phase changes are combined.

What is Quadrature Amplitude Modulation (QAM)?

800

An attack involving redirection of legitimate INTERNET website traffic through fraudulent paths and fraudulent locations. 

What is a WIDE AREA NETWORK Man-in-the-middle attack? 

1000

TIf your IP is 192.168.100.10/24, direct delivery to this IP address 192.168.101.15 is impossible because of this reason. 

What is "the host is on a different subnet"?

Daily Double

1000

ARP tables map these two types of addresses together.   

What are IP addresses and MAC addresses?
(Daily Double)

1000

 The shortest IP mask you could use to hijack a network starting at 10.0.0.0 if you only want to hijack addresses up to 10.0.15.255.

What is /20?  

1000

In digital modulation, the rate at which symbols are transmitted is known as this. 

What is the Symbol Rate (Baud Rate)?

1000

A common C programming function vulnerable to buffer overflow attacks due to lack of built-in boundary checking.

What is scanf? 

M
e
n
u