1. What does TCP stand for?

2. What port is TCP?

3. What port is DNS?

4. What is SMTP?

5. Name the TCP/IP layer that TCP belongs to.

6. Which OSI layer does a router operate in.

7. What feature gives switches layer 3 functionality?

8. What port is DHCP?

9. What port is ICMP?

10. What does ICMP stand for?

11. What does DHCP stand for?

12. What does OSI layer 6 do?

13. What port is FTP?

14. What does SSH do?

15. What's the difference between POP3 and SMTP?

16. What does OSI layer 1 do?

17. What does UDP stand for?

18. Do LANs use routing tables?

19. Which OSI layer do switches mainly operate?

20. Name the layers of the TCP/IP model.

21. What is the shorthand for the subnet mask 255.255.252.0?

22. What is the broadcast address for the network 172.25.0.0/24?

23. What class is the IP address 10.305.1.256?

24. What class is the IP address 8.8.8.8?

25. What is the full subnet mask for /28?

26. What is the valid host range for the network 192.168.0.64/26?

27. How many usable IP addresses are in a /30 subnet?

28. What is the first usable host IP address in the network 251.156.11.64/15?

29. What is the full subnet mask for /24?

30. What is the broadcast address for the network 192.168.2.0/25?

31. What is valid host range for the network 10.1.0.64/27?

32. What is the full subnet mask for /18?

33. What class is the IP address 172.0.0.1?

34. What is the default gateway for the IP address 192.168.12.254/24?

35. What is the shorthand for the subnet mask 255.255.255.254?

36. What is the valid host range for the network 10.10.1.64/28?

37. What is the default gateway for the IP address 200.10.10.3/30

38. What network does the IP address 192.168.0.25/25 belong to?

39. What network does the IP address 172.16.50.16/23 belong to?

40. What is the default gateway for the IP address 10.0.0.130/26

41. Can a router provide DHCP services?

42. What does ARP stand for?

43. Why does a device need a MAC address?

44. Why would you refer to the TCP/IP model instead of the OSI model?

45. What does NAT stand for?

46. Why would a router do port forwarding?

47. Can a router perform NAT?

48. Can a router do ARP?

49. What's the difference between HTTP and HTTPS?

50. What TCP/IP layer does FTP work in?

51. Can a host also be a server?

52. How many bits are in a IPv4 address?

53. Which protocol is implemented to mitigate IPv4 address exhaustion?

54. What port is HTTP and HTTPS?

55. What does DNS do with URLs and IPs?

56. List 5 common DNS record types.

57. Why would an online banking site need SSL/TLS?

58. What role does an IDS/IPS do inside a network?

59. What layer 2 technology connects devices inside a network?

60. What role do router ACLs do inside a network?

61. Can switches have ACLs?

62. Which bytes of a MAC address identify the manufacturer?

63. What is nbns?

64. What port does Kerberos use?

65. What is a DHCP lease?

66. What routing algorithms do WAN use?

67. What does the PSH flag do in TCP packets?

68. In Ethernet frames, what is MTU?

69. What are the three steps of the TCP Handshake?

70. What flags are used to end a TCP connection?

71. What is a broadcast IP address?

72. What does the MAC address FF:FF:FF:FF:FF:FF mean?

73. What is a firewall policy?

74. What does it mean when a firewall policy is default deny?

75. How do firewalls filter traffic based on website data?

76. How do firewalls filter traffic based on website data?

77. What is anomaly-based detection in network security?

78. What is signature-based detection in network security?

79. How do firewalls inspect the packets with encrypted payloads?

80. Can firewall be software or hardware?

81. What is polymorphic malware?

82. What is a worm?

83. What is a rootkit?

84. What does RAT stand for?

85. What does the term Script Kiddies mean?

86. What are the 2 servers needed for Kerberos?

87. What are digital certificates used for?

88. What do you do in Weaponisation(2) in the Cyber Kill Chain?

89. What do you do in the 8th step of the Cyber Kill Chain?

90. What do you do in Exploitation(4) in the Cyber Kill Chain?

91. What is a logic bomb?

92. Can you use hashes to encrypt files?

93. What's the difference between encoding and encrypting?

94. What is more secure, MD5 or SHA-256?

95. What encoding algorithm would have leading "==" as padding?

96. Why is ROT-26 not a valid encoding algorithm?

97. Are private and public keys involved in symmetric encryption?

98. Is Kerberos symmetric or asymmetric encryption?

99. What is SFTP?

100. Why would a sender share the public key and not the private key?

101. Which tcpdump option lets you 'carve' pcaps?

102. How do you filter for https traffic in tcpdump?

103. Which tcpdump option switches timestamps to UTC time?

104. In tcpdump, why would do -w instead of > foo.pcap ?

105. Does tcpdump -nn slow down command execution?

106. In tcpdump, how do you extract hostnames from DHCP?

107. In tcpdump, what does the tcpflag [S.] mean?

108. In tcpdump, how do you filter 192.168.0.1's FTP traffic?

109. How do you pipe tcpdump -r output to awk?

110. How do you print the 13th field using awk?

111. How can you print the last field using awk?

112. In awk, how do you filter for the ip 172.16.0.1 and then print the 5th field?

113. Given a list of filenames, how would you use regex to only filter for html files?

114. How would you use awk to filter for lines that have greater than 15 characters?

115. How would you use awk to print the character length of the 2nd field in each line?

116. Where does usually Linux keep a file that lists the port mappings for every service?

117. How would you use Linux's /etc/services to find the port numbers of all SQL services?

118. How would use Linux's /etc/services to the find the service with the default port of 4094?


Note: you can use arrow keys!