What is a Private IP address?
What cannot be directly accessed from the internet?
Protocol used to find a MAC address given an IP address on a local network.
What is Address Resolution Protocol (ARP)?
The routing protocol known for finding the shortest path within a single Autonomous System.
What is OSPF?
This is a benefit of digital signals over analog signals.
What is relative noise immunity?
What is easier to process and store?
What is error detection and correction?
What is easier multiplexing?
The pillar of information assurance violated by unauthorized data modification
What is Integrity?
The total number of usable host addresses in a /26 subnet.
What is 62?
The broadcast MAC address used in ARP requests.
What is FF:FF:FF:FF:FF:FF?
An attack where false routing information redirects traffic through an unauthorized host.
What is a Man-in-the-Middle attack?
Nyquist theorem states your sampling rate must be at least this multiple of the highest frequency in the signal.
What is two times?
e.g.
fm(max) = 100 Hz
f(sampling) = 200 Hz
These criteria are IDEAL conditions for you to conduct a successful Buffer Overflow attack
- Executable file that allows for user input
- The executable file is owned by root
- The executable file that has the SETUID Flag set (i.e. rws - - x - - x).
Given an IP address of 192.168.50.1 and a subnet mask of /24, this is the network address.
What is 192.168.50.0?
An attacker sends fraudulent ARP replies to associate their MAC address with another host's IP. This attack is called:
What is ARP Spoofing?
This type of routing protocol uses Autonomous Systems and is susceptible to wide-area MITM attacks.
What is BGP (Border Gateway Protocol)?
Increasing this component of an Analog-to-Digital Converter (ADC) reduces quantization noise.
What is the number of bits (resolution)?
This many bytes are allocated for this C program:
char[10] = "Navy";
int[3] = {10, 11, 12, 13};
float[2] = {3.14};
What are 30 bytes?
The highest assignable IP address to a host in the network 172.16.0.0/16.
What is 172.16.255.254?
ARP operates between these two layers in the TCP/IP model.
What are Network and Data-Link Layers?
One defensive measure to prevent unauthorized OSPF routing updates.
What is configuring passive interfaces?
AND
What are passwords?
A digital modulation method where amplitude and phase changes are combined.
What is Quadrature Amplitude Modulation (QAM)?
An attack involving redirection of legitimate INTERNET website traffic through fraudulent paths and fraudulent locations.
What is a WIDE AREA NETWORK Man-in-the-middle attack?
TIf your IP is 192.168.100.10/24, direct delivery to this IP address 192.168.101.15 is impossible because of this reason.
What is "the host is on a different subnet"?
Daily Double
ARP tables map these two types of addresses together.
What are IP addresses and MAC addresses?
(Daily Double)
The shortest IP mask you could use to hijack a network starting at 10.0.0.0 if you only want to hijack addresses up to 10.0.15.255.
What is /20?
In digital modulation, the rate at which symbols are transmitted is known as this.
What is the Symbol Rate (Baud Rate)?
A common C programming function vulnerable to buffer overflow attacks due to lack of built-in boundary checking.
What is scanf?