Firewalls,IDS & Securing Networks + Network Diagrams
List methods, conditional statements & for loops + Variable & string methods
Network Connections, Ports, & Protocols + Network traffic analysis & analyzing data streams
Encoding encryption, PKI, and SSL + Intro to Python
Functions & log parsings + Dictionaries & Regular Expressions
100

You are tasked with implementing host-based firewalls on a network with a mix of Windows and Linux systems. To enhance security, you decide to use commonly available tools designed for these platforms.

What are Windows Defender Firewall, Linux iptables, UFW, and firewalld?

100

While writing a Python script, you need to determine the position of the first occurrence of a specific substring within a larger string. You decide to use a built-in string method to accomplish this task.

What is the index() string method?

100

You are configuring a device on a local network with the IP address 192.168.2.50. To properly segment the network and ensure correct routing, you need to assign the appropriate subnet mask.

What is a subnet mask of 255.255.255.0?

100

You are tasked with encrypting sensitive messages where the security of the encryption relies on a key that is as long as the message itself. The key is used only once and is discarded after use to prevent reuse.

What is a one-time pad?

100

You are writing a Python function that needs to enhance code modularity and readability. By allowing the function to send results back to the calling code, this feature promotes code reusability and keeps functions focused on specific tasks.

What is the return statement?

200

You are configuring a Linux system to restrict unauthorized network access. The tool you choose offers a simplified interface to set up and manage firewall rules without requiring extensive knowledge of iptables.

What is an Uncomplicated Firewall (UFW)?

200

In your Python program, you need to iterate through each element of a sequence, such as a list or a range, executing a specific block of code for each element. The iteration should automatically stop when all elements have been processed.

What are for loops?

200

You are configuring a network device with the IP address 192.168.2.30. To identify the specific host on the network, you need to determine its unique host ID.

What is a host ID of 30?

200

You are configuring a secure communication channel between two systems, ensuring that both authentication and data encryption are handled correctly. A pair of cryptographic keys is used to facilitate this secure communication.

What are SSH keys?

200

In Python, you are working with a string and need to access a particular character at a specific position. You use a method that allows you to retrieve the character by specifying its index.

What is a square bracket []?

300

While securing a wireless network, you choose a security protocol known for providing strong encryption and authentication. This protocol uses TKIP or AES encryption algorithms to protect data transmitted over the network.

What is WPA (Wi-Fi Protected Access)?

300

In Python, you are working with an assignment statement where the operand on the left represents the name of a variable, and the operand on the right is the value that will be stored in that variable.

What is the equal sign (=)?

300

You are troubleshooting a network issue and need to analyze the traffic flowing through your network. You decide to use a tool that captures and inspects network packets in real time, allowing you to examine the protocols being used and identify potential problems.

What is "Wireshark" a network protocol analyzer used to capture and inspect network traffic in real time?

300

You are setting up a system for securely transmitting files, and you decide to use a form of encryption that combines both symmetric and asymmetric methods. In this system, a public key is used to encrypt the data, while a private key is used to decrypt it.

What is GPG (GNU Privacy Guard) encryption?

300

In Python, you are working with a file and need to retrieve all the lines from it as a list. This command allows you to read the contents of the file and return them in a list format.

What is readlines()?

400

You are designing a network architecture that requires a flexible and scalable method to separate traffic. To achieve this, you decide to implement segmentation using software configurations such as VLANs or subnets.

What is logical segmentation?

400

In networking, data is transmitted in small, manageable chunks that travel across different routes in the network. Once these chunks reach their destination, they are reassembled to form the original data.

What is a packet?

400

You are configuring a router to allow devices on a private network to communicate with external networks, such as the internet. This technique will help translate private IP addresses to a public one, allowing for proper routing.

What is Network Address Translation (NAT)?

400

You are working with a Python program that needs to store multiple items in a specific order. The collection you're using allows you to modify the contents after creation, including adding, removing, or changing elements.

What are lists?

400

n Python, you're working with a list and need to access the last element directly. You also want to reverse sections of the list for manipulation. This method allows you to index elements from the end and perform slicing operations efficiently.

What is negative indexing?

500

While designing a secure network architecture, you decide to create a network segment that acts as a buffer between your organization's trusted internal network and untrusted external networks like the internet. This segment is used to host public-facing services such as web or email servers.

What is a Demilitarized Zone (DMZ)?

500

In programming, you are working with a system that needs to perform logical operations, comparisons, and control flow based on conditions. This tool represents two possible values: True or False, and is often used in conditional statements.

What is a Boolean operator?

500

You are troubleshooting network communication issues within a local network. To enable devices to identify each other at the data link layer, a protocol is used to map IP addresses to their corresponding Media Access Control (MAC) addresses.

What is the purpose of ARP (Address Resolution Protocol)?

500

You are developing a Python program that needs to handle real numbers, which may include fractions. The data type you're using allows for the representation of numbers with a fractional component, separated by a decimal point.

What are floating-point numbers?

500

In Python, you are writing a program that includes several auxiliary functions. To execute the program and call these functions, you use a command that organizes and triggers the execution of the entire script.

What is the main() command?

M
e
n
u