Switches(exam)
2/5
Routers(exam)
3/5
Firewalls(exam)
5/5
Linux Commands
Random
100

The advantages of _____ is that they are cheap and great for small networks 

Hubs

100

what is the best description of an Access Control List?

It is a set of rules to govern what type of traffic to let in to a network.

100

If you wanted to allow any IP if its protocol 80 or 25 but deny everything else. You would use this security tool. 

Firewall

100

to write a python script that can run terminal commands you would import this library 

Import OS

100

Before they were officially added to Minecraft on June 30, 2011 this item was first introduced as a mod

Pistons

200

In general, a bridge or an aggregate switch acts as ___s to join various parts of the ___ together.

act as intermediaries to join various parts of the network together.

200

The rule of 'implicit deny' essentially states that

all traffic will be denied unless specifically let in.

200

This firewall will cover an entire group or subnet of machines

network-based

200

in Linux this program is used to preform a verity of attacks on hashed passwords

Hashcat

200

This type of plant commonly found in growing all around the US in the summer can help rid your body of salt and has anti-inflammatory property's 

Dandelion

300

As a network technician, you are trying to avoid flooding attacks. To do so you would use this security mechanism

Flood Guard

300

You want to implement antispoofing on a router that is sitting outside of your network. How would you best meet this goal?

Prevent all incoming traffic from private IP addresses.

300

This firewall is meant to protect a single host.

Host-based

300

Just like the "ifconfig" command in Linux is used to configure network interfaces. This command is used to configure bluetooth devices.

hciconfig

300

This type of learning can be used to master anything extremely quickly  

Meta Learning (learning how to learn)

400

This kind of prevention marks what switch the packet has came from so it cant be sent back

Loop Prevention

400

In a spoofing attack, an attacker

attempts to masquerade as someone or something else.

400

(2 answers, points will be split if one answer is correct)

This firewall is subject to flooding attacks.

This firewall is subject to spoofing attacks.

flooding attacks. → Stateful firewall 

spoofing attacks. → Stateless firewall

400

in the command 

"chmod 644 myfile.txt"

this sets the permissions of this file to be what for the owner?

Read write


400

This sport is the most popular indoor sport in the world. Its name is also a ablaut reduplication.

Ping Pong

(ablaut reduplication is the term for repeating a word with a different vowel to make a phrase)

500

The primary benefit of a switch over a hub is that it.

uses unicast.

500

Marco plans to attack a network by intercepting incoming packets, copying the IP address, and then sending his own packets with the copied IP address. This type of attack is known as.

Spoofing

500

An organization's firewall has been breached. Security analysts discovered that the attackers used the TCP protocol to get into the system without having performed the 3-way handshake. Which type of firewall would aid in solving this problem?

Stateful firewall

500

Given the following obfuscated code discern what the code is doing:

first_num = int(input("Enter a number: "))

second_num = bin(first_num)

print(first_num, "is", second_num)


converts decimal numbers to binary 

500

a standard deck of playing cards can have this many possible combinations when shuffled. 

8x1067 Which is more possible combinations than atoms on earth. No one has or likely ever will hold the exact same arrangement of 52 cards