IT forensics
If you were to see the subnet mask 255.255.252.0, what CIDR notation (prefix) would you use to indicate the same thing? A. /23 B. /22 C. /21 D. /20
/22
Which of these addresses would be considered a private address (RFC 1918 address)? A. 172.128.10.5 B. 9.10.10.7 C. 172.20.128.240 D. 250.28.17.10
172.20.128.240
What is a MAC address used for? A. Addressing systems over a VPN B. Addressing systems through a tunnel C. Addressing systems over TCP D. Addressing systems on the local network
Addressing systems on the local network
The UDP headers contain which of the following fields? A. Source address, destination address, checksum, length B. Destination port, sourceport, checksum, length C. Flags, source port, destination port, checksum D. Length, checksum, flags, address
Destination port, sourceport, checksum, length
If you were looking for the definitive documentation on a protocol, what would you consult? A. Request for Comments B. Manual pages C. Standards D. IEEE
Request for Comments
What are the three steps in the TCP handshake as described by the flags set? A. SYN, SYN/URG, RST B. RST, SYN, ACK C. SYN, SYN/ACK, ACK D. SYN, SYN/ACK, ACK/URG
SYN, SYN/ACK, ACK
The Protocol Data Unit (PDU) for TCP is called a _____________. A. Packet B. Datagram C. Frame D. Segment
Segment
Which of these devices would not be considered part of the internet of things? A. Smartphone B. Thermostat C. Light Bulb D. Set-top cable box
Smartphone
Which network topology are you most likely to run across in a large enterprise network? A. Ring topology B. Bus topology C. Full mesh D. Star-bus hybrid
Star-bus hybrid
If you wanted a lightweight protocol to send real-time data over, which of these would you use? A. TCP B. HTTP C. ICMP D. UDP
UDP
Which of these services would be considered a storage as a service solution? A. Microsoft Azure B. iCloud C. Google Compute D. DropLeaf
iCloud
Which of these protocols would be used to communicatie with an IoT device? A. ICMP B. SMTP C. Telnet D. HTTP
HTTP
Which protocol is necessary to enable the functionality of traceroute? A. HTTP B. SNMP C. ICMP D. IP
ICMP
Which header field is used to reassemble fragmented IP packets? A. Source address B. IP identification C. Don't fragment bit D. Acknowledgment field
IP identification
What order, from bottom to top, does the TCP/IP architecture use? A. Network Access, Network, Transport, Application B. Link, Internet, Transport, Session, Application C. Physical, Network, Session, Application D. Data Link, Internet, Transport, Application
Link, Internet, Transport, Session, Application