and Answers29
Ethernet OSI layer?* - ANSWERS-Layer 2, Data Link
IPv4 / IPv6, routing protocols OSI layer?* - ANSWERS-Layer 3, Network
ICMP replies* - ANSWERS-Request
Echo Request
Timestamp Request
Address Mask Request
Message
Echo reply
Destination unreachable
Redirect
Time exceeded
Parameter problem
Source quench
Private Addresses* - ANSWERS-Class A - 10.0.0.0 /8
Class B - 172.16.0.0 /12
Class C - 192.168.0.0 /16
Wireless IEEE - ANSWERS-802.11
,Examples or Shared Media - ANSWERS-facebook, instagram or any publicly available
information
VLAN vulnerabilities - ANSWERS-VLAN hopping
VLAN tagging
What is Token Ring? - ANSWERS-basically like a circle where one host is only connected to 2
hosts
File transfer using netcat* - ANSWERS-Sender
nc <host> <port> < file
Receiver
nc -l <port> > file
Ingress Filtering - ANSWERS-filter inbound traffic
Egress Filtering - ANSWERS-filter outbound traffic
RSA key length - ANSWERS-1024, 2048, 4096 bits
RC4 key length - ANSWERS-40 - 2048 bits
DES key length - ANSWERS-56 bits
3DES key length - ANSWERS-56 x 3 = 168 bits
, AES key length - ANSWERS-128, 192, 256 bits
SHA1 hash length - ANSWERS-40 characters
MD5 hash length - ANSWERS-32 hexadecimal characters
Example
84e5f5b9dad87e723b37de2e5c4cf072
What is a Symmetric key? - ANSWERS-uses 1 key to both encrypt and decrypt
What is an Asymmetric key? - ANSWERS-uses 1 key to encrypt and another key to decrypt
What is HMAC? - ANSWERS-mixes public and private keys and hashes them
HMAC full form* - ANSWERS-hash-based message authentication code
IPSec port? - ANSWERS-Udp 500
What does IPSec do? - ANSWERS-adds encryption and authentication
PPTP full form - ANSWERS-point-to-point tunneling protocol
PPTP port - ANSWERS-Tcp 1723
PGP Full form - ANSWERS-pretty good privacy