Networking Fundamentals Quiz
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of sub-netting in networking?

  • To enhance the security protocol of wireless connections.
  • To facilitate direct communication between different network providers.
  • To divide a larger network into smaller, manageable segments. (correct)
  • To increase the overall bandwidth of the network.
  • Which CIDR notation represents a subnet mask of 255.255.255.128?

  • /25 (correct)
  • /26
  • /27
  • /24
  • In network analysis, which tool is primarily used for capturing and inspecting network traffic?

  • iptables
  • Wireshark (correct)
  • tcpdump
  • ping
  • What does the ARP command primarily do in a network?

    <p>Provide translation between IP addresses and MAC addresses.</p> Signup and view all the answers

    Which of the following is NOT a basic function of an iptables firewall?

    <p>Monitoring network traffic in real-time.</p> Signup and view all the answers

    What does the 'Follow Streams' feature in Wireshark allow a user to do?

    <p>Reconstruct the TCP communication between hosts.</p> Signup and view all the answers

    Which security protocol is specifically designed for Wi-Fi networks?

    <p>WPA3</p> Signup and view all the answers

    What is a common use of Aircrack-ng commands in networking?

    <p>To assess Wi-Fi security and perform penetration tests.</p> Signup and view all the answers

    How many usable subnets can be created by borrowing 3 bits from the host portion?

    <p>8</p> Signup and view all the answers

    What is the maximum number of hosts per subnet when 5 bits are left in the network portion after borrowing?

    <p>30</p> Signup and view all the answers

    Which command would you use to check your network configuration in Kali Linux?

    <p>ifconfig</p> Signup and view all the answers

    What does the ping command help determine?

    <p>If a system is live</p> Signup and view all the answers

    Which component of the ifconfig command output provides the default gateway?

    <p>IPv4 address</p> Signup and view all the answers

    What is the result of using 3 bits for subnets in terms of the subnet mask?

    <p>/27</p> Signup and view all the answers

    How would you ping a domain using its name?

    <p>ping <domain name></p> Signup and view all the answers

    What does the subnetting process involve when modifying an IP address?

    <p>Borrowing bits from the host portion</p> Signup and view all the answers

    What is the primary purpose of subnetting in IP addressing?

    <p>To create smaller, more manageable networks.</p> Signup and view all the answers

    Which of the following correctly describes a subnet?

    <p>A network constructed from portions of one or more Class A, B, or C networks.</p> Signup and view all the answers

    What does a subnet mask indicate?

    <p>Which bits in an IP address refer to the network ID and which refer to the host ID.</p> Signup and view all the answers

    In CIDR notation, what does the number after the slash represent?

    <p>The number of bits in the network mask.</p> Signup and view all the answers

    Which class of network has a standard network ID of 24 bits?

    <p>Class C</p> Signup and view all the answers

    What would be the result of applying a binary AND operation between an IP address and its subnet mask?

    <p>Identification of the network ID from the IP address.</p> Signup and view all the answers

    Which of the following statements about subnets is true?

    <p>All devices in a subnet must share the same network ID.</p> Signup and view all the answers

    What can be a consequence of not using subnetting effectively in a large organization?

    <p>Increased traffic leading to network slowdowns.</p> Signup and view all the answers

    Study Notes

    Network Basics for Hackers

    • This book is about networking basics and how they can be broken
    • It's one of a series of books on hacking from Occupytheweb
    • The intended audience is people with little or no networking background
    • The book uses Kali Linux as its platform
    • The book assumes the reader has read a prior book, Linux Basics for Hackers

    Table of Contents

    • Prelude

      • What is a White Hat Hacker?
      • Our Actions and Activities in Ukraine
    • Network Basics

      • IP Addresses
      • Classes of IP addresses
      • Public v Private IP addresses
      • DHCP
      • NAT
      • Ports
      • TCP/IP
      • Protocols
        • TCP
        • UDP
      • TCP Three-Way Handshake
      • Network Topologies
      • OSI Model
      • Exercises
    • Subnetting and CIDR Notation

      • Why Sub-netting
      • Sub-Nets
      • Sub-net Masks
      • CIDR Notation
      • Exercises
    • Network Analysis

      • Command-line (CLI) network analysis Tools
      • Network Sniffers
      • tcpdump
      • Wireshark
        • Creating Filters in Wireshark
        • Following Streams
        • Statistics
      • Exercises
    • Linux Firewalls

      • iptables basics
      • Installing iptables
      • Configuring iptables
      • Creating rules
      • Exercises
    • Wi-Fi Networks (802.11)

      • Wi-Fi Basics
      • Wi-Fi Security Protocols
      • Wi-Fi Adapters for Hacking
      • Aircrack-ng commands
      • Anatomy of Wi-Fi Frames
      • Wireshark Filters for Wi-Fi Frames
      • Attacking Wi-Fi APs
      • Wi-Fi Exercises
    • Bluetooth Networks

      • Basic Linux Bluetooth Tools
      • Bluetooth Basics
      • Bluetooth Protocol Stack
      • Bluetooth Security
      • Bluetooth Hacking Tools
      • Bluetooth Hacking Tools
      • Exercises
    • Address Resolution Protocol (ARP)

      • How ARP Works
      • ARP Command
      • ARP Packets in Wireshark
      • Exercises
    • Domain Name System (DNS)

      • Domain Names
      • How DNS Works
      • DNS Components
      • Zone Files and Records
      • Common Resource Record Types
      • SOA Records
      • Packet Level Analysis of DNS Queries
      • Exercises
    • Server Message Block (SMB)

      • What is SMB
      • SMB Vulnerabilities
      • Exercises
    • Simple Message Transfer Protocol (SMTP)

      • What is SMTP
      • The Email Processing Model
      • Types of MTUs
      • Packet-Level Analysis with Wireshark
      • Building an SMTP (EXIM4) Server in Linux
      • Exercises
    • Simple Network Management Protocol (SNMP)

      • Background on SNMP
        • SNMP Versions
      • Wireshark Analysis
        • Exercises
    • HTTP Protocol

      • HTTP Requests
      • HTTP Responses
      • HTTP Methods
      • URls
      • HTTP Headers
      • Cookies
    • HTTP Authentication

    • Hacking Web App Authentication with BurpSuite

    • Exercises

    • Automobile Networks

      • The CAN Protocol
      • Techniques for attacking automobile networks and devices
      • Exercises
    • SCADA/ICS Networks

      • SCADA/ICS Manufacturers
      • SCADA/ICS Communication Protocols
      • Exercises
    • Radio Frequency Networks with SDR

      • Radio-based technologies
      • Terminology
        • AP
        • PSK
        • SSID
        • ESSID
        • BSSID
        • Channels
        • Power
        • Security
      • Wi-Fi (802.11) Security Protocols
        • WEP
        • WPA
        • WPA2
      • Wi-Fi Adapters for Hacking
      • Viewing Wireless Interfaces
      • Monitor Mode
      • Capturing Frames
      • Filter by Port, ID, etc.
      • Exercises
    • Exercises

    • Appendix A - Cyber Warrior Wisdom of Master OTW

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Network Basics for Hackers PDF

    Description

    Test your understanding of key networking concepts and tools with this quiz. Questions cover sub-netting, network traffic analysis, firewall functions, and security protocols. Perfect for students and professionals looking to refresh their knowledge.

    More Like This

    Use Quizgecko on...
    Browser
    Browser