1.
Which command would be used to determine that your computer can communicate with another one?
Correct Answer
B. Ping
Explanation
The correct answer is "ping". The ping command is used to test the connectivity between two devices on a network. It sends a small packet of data to the specified device and waits for a response. If a response is received, it indicates that the two devices can communicate with each other. Therefore, using the ping command can help determine if your computer can communicate with another one.
2.
Which of the following is NOT an operating system?
Correct Answer
D. Excel
Explanation
Excel is not an operating system because it is a spreadsheet software application developed by Microsoft. It is used for creating, editing, and organizing data in tabular form. Unlike operating systems such as Windows, Linux, and Unix, Excel does not manage hardware resources, provide a user interface, or run other software applications. It is designed for specific tasks related to data analysis and manipulation, rather than serving as a foundational software platform for a computer system.
3.
Which of the following is a valid, complete, IPv4 address?
Correct Answer
B. 44.23.2.45
Explanation
The correct answer is 44.23.2.45. This is a valid, complete IPv4 address because it consists of four numbers separated by periods, each number ranging from 0 to 255.
4.
In Linux, what command would you use for determining the files in a directory?
Correct Answer
C. Ls
Explanation
The "ls" command is used in Linux to list the files and directories in a directory. It provides a detailed view of the contents within a specified directory, including file names, sizes, permissions, and timestamps. By using different options with the "ls" command, users can customize the output to suit their needs, such as displaying hidden files or sorting the output in a specific order.
5.
What device’s primary purpose is to limit network access?
Correct Answer
C. Firewall
Explanation
A firewall is a device that is primarily designed to limit network access. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. The firewall examines incoming and outgoing network traffic and decides whether to allow or block it based on predetermined security rules. By doing so, it helps protect the network from unauthorized access, malicious attacks, and potential security breaches. Therefore, a firewall is the correct answer as it is specifically designed to limit network access.
6.
A virtual machine is:
Correct Answer
A. One operating system running in software that is running in another operating system
Explanation
A virtual machine refers to the concept of running one operating system within another operating system using virtualization software. This allows for the creation and execution of multiple virtual instances of an operating system on a single physical machine. The virtual machine operates independently from the host operating system and provides a separate environment with its own resources, such as CPU, memory, and storage. This setup enables users to run different operating systems and applications simultaneously, providing flexibility and isolation.
7.
Which best describes a process in Linux?
Correct Answer
B. A currently running instance of a program
Explanation
A process in Linux refers to a currently running instance of a program. In Linux, a process is created when a program is executed and it represents the execution of that program. Each process has its own unique process ID (PID) and it can interact with other processes, communicate with the operating system, and perform various tasks. Therefore, out of the given options, "A currently running instance of a program" is the most accurate description of a process in Linux.
8.
Which of the following is an executable file, given their output from the ls -al command?
Correct Answer
D. -rwxr-xr-x 1 root root 145320 Jun 10 2012 less
Explanation
The correct answer is "-rwxr-xr-x 1 root root 145320 Jun 10 2012 less". This is an executable file because it has the "x" permission set for the owner, group, and others. The "x" permission allows the file to be executed as a program.
9.
Which command would you use to make it so a process no longer runs?
Correct Answer
B. Kill
Explanation
The "kill" command is used to terminate or stop a process from running. It sends a signal to the process, indicating that it should be stopped. This command is commonly used in Unix-like operating systems to forcefully end a process that is not responding or causing issues. By using the "kill" command followed by the process ID, the process can be effectively stopped and removed from the system's memory.
10.
Processes that are capable of handling requests that come over the network will be listening for requests on:
Correct Answer
B. A port
Explanation
Processes that are capable of handling requests that come over the network will be listening for requests on a port. A port is a communication endpoint that allows different processes on a computer to send and receive data. When a process is listening on a port, it is actively waiting for incoming network requests to be received and processed. By listening on a specific port, the process can establish network connections and communicate with other processes or devices over the network.
11.
The IPv4 Domain Name System (or DNS) is responsible for:
Correct Answer
C. Mapping an IP address to a human readable name
Explanation
The IPv4 Domain Name System (DNS) is responsible for mapping an IP address to a human-readable name. This means that instead of using a series of numbers to access a website or server, the DNS allows us to use domain names such as www.example.com. The DNS acts as a directory that translates these domain names into the corresponding IP addresses, allowing computers to communicate with each other over the internet using recognizable names rather than just numerical addresses.
12.
Another name for a folder is:
Correct Answer
A. A directory
Explanation
A folder is a container used to organize files and other folders on a computer's file system. It is also commonly referred to as a directory. Therefore, "a directory" is another name for a folder.
13.
Which of the following commands will take the output of the ls command and put it in a file name output.txt?
Correct Answer
B. Ls > output.txt
Explanation
The correct answer is "ls > output.txt". This command uses the ">" symbol to redirect the output of the "ls" command into a file named "output.txt". This means that the output of the "ls" command will be saved in the "output.txt" file.
14.
Which network mask would work for a network that had 200 computers on the same subnet?
Correct Answer
A. 255.255.255.0
Explanation
The network mask 255.255.255.0 would work for a network that had 200 computers on the same subnet because it provides enough host addresses for 256 devices. This means that it can accommodate the 200 computers on the network, leaving some additional addresses available for future expansion or other devices.
15.
The following is a listing for a file. What are the user/group assignments for this file?
drwxr-xr-x 1 nobody root 4096 Mar 15 2013 Desktop
Correct Answer
A. User of nobody, group of root
Explanation
The file "Desktop" has the permissions "drwxr-xr-x", which means it is a directory with read, write, and execute permissions for the owner (user), read and execute permissions for the group, and read and execute permissions for others. The number "1" indicates that there is one link to this directory. The user assignment is "nobody" and the group assignment is "root". Therefore, the correct answer is "user of nobody, group of root".
16.
In Linux, the top level (or root) directory is:
Correct Answer
D. /
Explanation
The top level (or root) directory in Linux is denoted by a forward slash (/). This is the highest level directory in the file system hierarchy and serves as the starting point for navigating the file system. It contains all other directories and files in the system.
17.
A common name for the account with full privileges in Linux is:
Correct Answer
C. Root
Explanation
In Linux, the account with full privileges is commonly referred to as "root". The root account has the highest level of administrative access and can perform any action on the system, including modifying system files and configurations. It is important to exercise caution when using the root account, as any mistake or malicious action can have severe consequences on the system.
18.
The command to change your current working directory, to the directory above it is:
Correct Answer
B. Cd ..
Explanation
The correct answer is "cd ..". This command is used to change the current working directory to the directory above it. The ".." represents the parent directory of the current directory. By using this command, you can navigate up one level in the directory structure.
19.
Which of the following prefixes is common for encrypted web pages?
Correct Answer
B. Https:
Explanation
The prefix "https:" is commonly used for encrypted web pages. "https" stands for Hypertext Transfer Protocol Secure, which is a secure version of HTTP. It uses encryption to protect the data transmitted between the web server and the user's browser, ensuring that the information cannot be intercepted or tampered with by unauthorized parties. This prefix is commonly used for websites that handle sensitive information, such as online banking, e-commerce, and social media platforms.
20.
When authenticating a user, which of the following can be used?
Correct Answer
D. Any of the above
Explanation
When authenticating a user, any of the above options can be used. This means that the authentication process can involve something the user has, such as a physical token or a smartphone; something the user is, such as biometric data like fingerprints or facial recognition; or something the user knows, such as a password or a PIN. The use of any combination of these factors can enhance the security of the authentication process and help ensure that the user is indeed who they claim to be.
21.
Which of the following is NOT used to move packets from one computer to another?
Correct Answer
C. Network attached storage
Explanation
Network attached storage (NAS) is not used to move packets from one computer to another. NAS is a storage device that provides file-level data storage and is typically used for data backup and sharing files over a network. On the other hand, a router, switch, and gateway are networking devices that are responsible for routing and forwarding packets between different networks or computers.
22.
Which of the following can be part of securing an operating system?
Correct Answer
D. All of the above
Explanation
Applying patches, updates, and service packs are all important measures for securing an operating system. Patches are software updates that fix vulnerabilities and bugs in the system. Updates include new features, bug fixes, and security enhancements. Service packs are comprehensive updates that include all previous patches and updates. By applying all of these, the operating system stays up to date with the latest security measures, ensuring protection against potential threats and vulnerabilities.
23.
A terminal is an example of:
Correct Answer
A. A command line interface
Explanation
A terminal is an example of a command line interface because it allows users to interact with a computer system through text-based commands. In a command line interface, users type commands directly into the terminal, which then executes those commands and provides the corresponding output. This differs from a GUI interface, where users interact with the computer system through graphical elements such as icons and menus.
24.
To remotely determine what services may be running on a server, a common technique is:
Correct Answer
B. Port scanning the server
Explanation
Port scanning the server is a common technique used to remotely determine what services may be running on a server. By scanning the ports of a server, one can identify which ports are open and potentially infer the services that are running on those ports. This information can be valuable for network administrators and security professionals to assess the security posture of a server and identify any potential vulnerabilities that may exist.
25.
Operating system passwords are generally stored as:
Correct Answer
C. Hashed
Explanation
Operating system passwords are generally stored as hashed. Hashing is a process that takes the original password and converts it into a fixed-length string of characters using a mathematical algorithm. This hashed value is then stored in the system's database instead of the actual password. Hashing is a one-way function, meaning it is extremely difficult to reverse-engineer the original password from the hashed value. This provides an added layer of security as even if the database is compromised, the attacker would not have access to the actual passwords.
26.
Which of the following tools could be used to sniff network traffic?
Correct Answer
A. Wireshark
Explanation
Wireshark is a powerful tool that can be used to sniff network traffic. It allows users to capture and analyze network packets, providing detailed information about the data being transmitted over the network. Wireshark is commonly used by network administrators and security professionals to troubleshoot network issues, monitor network activity, and detect any malicious or suspicious behavior. It provides a comprehensive view of network traffic, including protocols, source and destination IP addresses, and even the content of individual packets, making it an essential tool for network analysis and troubleshooting.
27.
The TCP three way handshake consists of the following flags being set in the TCP packets:
Correct Answer
D. SYN; SYN/ACK; ACK
Explanation
The correct answer is SYN; SYN/ACK; ACK. The TCP three-way handshake is the process used by TCP to establish a connection between two devices. It begins with the client sending a SYN (synchronize) packet to the server. The server responds with a SYN/ACK (synchronize/acknowledge) packet, indicating that it received the SYN packet and is willing to establish a connection. Finally, the client sends an ACK (acknowledge) packet to acknowledge the receipt of the SYN/ACK packet. This three-step process ensures that both the client and server are ready to communicate and establishes a reliable connection.
28.
The privileged TCP ports are:
Correct Answer
A. Less than 1024
Explanation
Privileged TCP ports are ports that are reserved for specific services and require special privileges to use. These ports are typically well-known ports used by common services such as HTTP (port 80) or FTP (port 21). In the TCP/IP protocol, port numbers range from 0 to 65535. Ports less than 1024 are considered privileged because they are reserved for system services and applications that require administrative access. Therefore, the correct answer is "less than 1024".
29.
To make it harder to determine what an attacker is doing, the attacker will often:
Correct Answer
D. All of the above
Explanation
To make it harder to determine what an attacker is doing, they will often employ multiple tactics. Deleting log files helps to cover their tracks by removing any evidence of their activities. Installing rootkits allows the attacker to gain unauthorized access and control over a compromised system, making it easier for them to hide their actions. Killing logging processes prevents any further logging of their activities, further obscuring their presence. Therefore, all of the mentioned actions are commonly employed by attackers to increase the difficulty of detection and investigation.
30.
Encrypt The message "THE HACKER IS NEAR" using the Caesar Cipher system below:
Standard Alphabet:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Caesar Alphabet:
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Correct Answer
C. QEB EXZHBO FP KBXO
Explanation
The given answer "QEB EXZHBO FP KBXO" is the encrypted form of the message "THE HACKER IS NEAR" using the Caesar Cipher system. In this system, each letter in the message is replaced with the corresponding letter from the Caesar Alphabet, which is shifted by three positions to the left compared to the Standard Alphabet. Therefore, "T" becomes "Q", "H" becomes "E", "E" becomes "B", and so on. Thus, the message "THE HACKER IS NEAR" is encrypted as "QEB EXZHBO FP KBXO".
31.
If we want to monitor web traffic, what information is useful?
Correct Answer
D. All of the Above
Explanation
To effectively monitor web traffic, it is essential to gather information about the source IP address, destination port, and destination address. The source IP address helps in identifying the origin of the traffic, allowing for tracking and analysis. The destination port indicates the specific service or application being accessed, aiding in understanding the nature of the traffic. The destination address provides insight into the intended recipient of the traffic, enabling the identification of potential patterns or anomalies. Collectively, having all of this information allows for comprehensive monitoring and analysis of web traffic.
32.
What protocol can cause a USB device to overwrite a host system’s memory?
Correct Answer
A. DMA
Explanation
DMA stands for Direct Memory Access. It is a protocol that allows peripheral devices, such as USB devices, to directly access the host system's memory without involving the CPU. In certain cases, if a USB device is compromised or malicious, it can use DMA to overwrite the host system's memory, potentially causing damage or unauthorized access. Therefore, DMA is the protocol that can cause a USB device to overwrite a host system's memory.
33.
What is the name of the attack that uses a memory overwrite:
Correct Answer
B. Buffer Overflow
Explanation
Buffer Overflow is the correct answer because it refers to the attack that occurs when a program or process tries to store more data in a buffer than it can hold, causing the excess data to overwrite adjacent memory. This can lead to the execution of malicious code or the crashing of the system.
34.
When the attacker captures information from the client, then forwards it on to the intended server, the attacker is performing a/an:
Correct Answer
A. Man-in-the-middle attack
Explanation
A man-in-the-middle attack occurs when an attacker intercepts communication between a client and a server, capturing information from the client and forwarding it to the intended server. This allows the attacker to eavesdrop on the communication, potentially stealing sensitive information such as login credentials or financial data. The attacker can also modify the data being transmitted, leading to unauthorized access or manipulation of the communication.
35.
To sniff traffic on an Ethernet network, the attacker will usually need to use which of the following attacks:
Correct Answer
B. ARP spoofing
Explanation
To sniff traffic on an Ethernet network, the attacker will usually need to use ARP spoofing. ARP spoofing involves sending fake Address Resolution Protocol (ARP) messages to the network, tricking the network devices into associating the attacker's MAC address with the IP address of the target. By doing so, the attacker can intercept and monitor the network traffic passing between the target and other devices, gaining unauthorized access to sensitive information. This attack allows the attacker to eavesdrop on the network without being detected.