A binary number is odd if it ends with a _____
1
Command (and flag!) for showing hidden files in a directory
ls -a
What base are the numbers that make up IP addresses in?
10
What's the difference between a port and a protocol?
A port is where network communication goes in and out; a protocol is the way that communication happens
Tariq says "data sent over HTTPS is encrypted." Walker says "nah bro, it's hashed."
Who's right, and why?
Tariq is - encrypted content can be un-encrypted by the recipient, but hashed content cannot ever be un-hashed.
What range of decimal numbers can be stored in 4 binary digits?
0-15
What does the "file" command do?
Displays information about the file, most notably its type
What privacy risks come from having your IP address leaked?
Not many... possibly:
1) accessing your general location
2) being scanned by nmap
3) insight into your ISP or VPN service
What are the default port numbers for HTTP and HTTPS?
80 and 443
Why might an organization like Equifax (or Jeffco Public Schools) hesitate to disclose that they've been victims of a cyber attack?
They need time to make sure they've fixed the issue; they don't want to cause panic; monetary (stock price) implications; they don't want to be targeted by other attackers
What letters are included in hexadecimal, and what decimal values do they represent?
A-F, 10-15
Linux command for searching for text within a file
grep
What information is stored in the first 6 digits of a MAC address?
Manufacturer of the computer's NIC (network interface card)
What's a PAN network? Give an example pls!
Personal Area Network; your AirPods connecting to your phone, or NFC when paying with Apple Pay or a tap credit card
One network has this subnet mask:
255.255.255.0
Another has this one:
255.255.0.0
How are the IPs generated by these networks' routers different?
First network's IPs have all the same first 3 numbers; second network's IPs only share the first two
Convert octal 44 to decimal
36
"cat" prints file contents to a terminal. What is "cat" short for?
concatenate
How many pairs of hexadecimal digits make up a MAC address?
6
We dissected an ethernet cable but discussed two other types of cables in frequent networking use. What were they?
Coaxial cables (phone line -> modem) and fiberoptic (broadband internet, among other things)
What's "security through obscurity" and why is it risky?
Reducing access to systems by making them hard to use or behave in unexpected ways; it can make it hard for others to help you fix your own systems, and can provide you with a false sense of security
How many binary digits do I need in order to assign a unique identifying number to each of my 23 algebra students?
5
24 = 16, so 4 is too few
25 = 32
What is the point of "piping" a command into less? For example: cat myfile.txt | less
Makes the contents of long files scrollable in the terminal
Why must you often spoof a MAC before spoofing an IP on a network?
The router won't give you a new IP unless your MAC has changed (and you appear to be a new computer)
Name three pieces of information stored in a typical networking packet.
Source IP, Destination IP, Data, TTL, version number, length, source/dest port, flags...
Describe how a "MAC flood" works.
Use ARP to fill a router's CAM table with too many MAC/IP addresses; cause the router to "fail open" and potentially leak information or behave erratically.