You are on page 1of 6

Cyber Security (22334VIC) Information Session

Time: xx, Day: xx, Date: xx, 2019

Instructions
Time allowed: 30 minutes
Mohammed Shadab Khan
1. Your Full Name: ------------------------------------------------------------------------
2. There is no pass or fail.
3. When answering the multiple choice or true/false questions, encircle the letter in front of
BEST answer for each question.
4. Do your best without consulting with anyone or using any paper or electronic notes.
5. If you have a question, please put your hand up for attention.

Question 1: What class times do you prefer?


a. Daytime (morning 9:00am – 6:30pm)
b. Evening (5:30pm – 9:30pm) and Saturday (9:30am – 6:30pm)
c. Either of the above choices are ok.
Question 2: Have you done any IT networking course before? If yes, please mention briefly the skills
you studied in that course.

I have recently completed TAFE Cerificate IV in Information


--------------------------------------------------------------------------------------------------------------------------------------
Technology in networking.
--------------------------------------------------------------------------------------------------------------------------------------
In this course CCNA networking skill - CCNA 1 & 2 were completed,
Network services - Installing , configuring Windows server, creating
--------------------------------------------------------------------------------------------------------------------------------------
VPN, Creating FTP and HTTP server.
--------------------------------------------------------------------------------------------------------------------------------------
Wireless Networking - Designing the WIFI network simulation
project, proposing the wireless network design for location.
------------------------------------------------------------------------------------------------------------------------------------

Question 3: Write the names of two Operating Systems that you have used or studied.
a. Windows Server 2016
b. Linux - Ubuntu ( Know some basic commands and have used
very often)
Question 4: MySQL is a freely available open source Relational Database Management System
(RDBMS) that uses Structured Query Language (SQL).
a. True
b. False

Question 5: How many bits are there in IPv4?


a. 16
b. 32

IT Section, Ultimo Campus Page 1 of 6


Cyber Security (22334VIC) Information Session
Time: xx, Day: xx, Date: xx, 2019

c. 48
d. 128
Question 6: What is the relation between bits and bytes when talking about data? (Write your
answer below)
1 Byte is equal to 8 bits.
1024 Bytes is 1 Kilo byte
1024 kilo bytes is 1 megabyte
1024 megabyte is 1 gigabyte
Question 7: Write one valid IPv4 or IPv6 address.
valid ipv4 address 202.52.36.49 (public)
valid ipv6 address 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Question 8: Write a class C private IP address.
192.168.1.1

Question 9: 169.254.120.120/24 is what type of IP address


a. Class A Address
b. IP Address reserved for Research and Future purpose.
c. APIPA (Automatic Private IP Addressing)
d. Public IP Address
Question 10: Which protocol is used to automatically assign IP addresses to hosts?
a. DNS
b. HTTP
c. DHCP
d. NAT
Question 11: What does WHS stand for?
a. World Health Standard
b. Work Health and Safety
c. Wireless Home Security
d. None of the above
Question 12: What is the first step in risk management for WHS?
a. Identify Hazards
b. Assess Risks
c. Control Risks
d. Monitor and Review
Question 13: What is Python in relation to Cyber Security?
a. Web Security Application
b. Programming / Scripting Language
c. A type of snake
d. An operating system

IT Section, Ultimo Campus Page 2 of 6


Cyber Security (22334VIC) Information Session
Time: xx, Day: xx, Date: xx, 2019

Question 14: If you assign these values in the following order:


X = 5, Y = X, X = 2
what will be the final values of variables X and Y?
X= 2
Y= 5
Question 15: Which protocol is used by web servers to serve up a web page?
a. POP
b. FTP
c. HTTP
d. IMAP
Question 16: Telnet is more secure than SSH.
a. True
b. False
Question 17: What ports are generally used for HTTP and HTTPS? (Choose Two)
a. 21
b. 80
c. 160
d. 443
e. 886
f. 110
Question 18: How many layers are there in OSI reference model and what are they?
Answer:

Application End user access like browser, messanger

Presentation Translation, compression, encryption/decryption

Session Session establish and maintenance

Transport Provide Flow error control at recevier and sender side

Network Routing of data, provide IP adrress,

Data-link check-sum to data, provide header to Frames, provide MAC


Address
Physical Describe the transmission used like co-axial, fiber etc

IT Section, Ultimo Campus Page 3 of 6


Cyber Security (22334VIC) Information Session
Time: xx, Day: xx, Date: xx, 2019

Question: 19: What are binary numbers? Give an example of a binary number.
Answer:

Binary number is represented in 0 and 1 bits.


--------------------------------------------------------------------------------------------------------------------------------------
where 0 is for false and 1 is true that represent value.
each bit of 1 is represent with value of power of 2.
--------------------------------------------------------------------------------------------------------------------------------------
example -- 111 = 2^2 + 2^1 + 2^0 = 4+2+1 = 7
--------------------------------------------------------------------------------------------------------------------------------
010 = 0+ 2^1+0 =2 , where value 0 in 010 is false, it is excluded.

Question 20: Convert decimal 255 number to an equivalent binary number.


Answer: 11111111

Question 21: List the 4 most important pieces of hardware in a computer?


a. Mother Board
b.
c.
RAM
d. Network Card
Processor
Question 22: Is the network switch a layer 2 or a layer 3 device?
Answer: It is Layer 2 device
a. Yes
b. no
Question 23: How many bits are in MAC address?
a. 32
b. 48
c. 64
d. 128
Question 24: What is the subnet mask for /24?
a. 255.0.0.0
b. 255.255.0.0
c. 255.255.255.0
d. 255.255.255.255
Question 25: What type of networking cable is typically used by television companies to carry data
as electrical signals?

IT Section, Ultimo Campus Page 4 of 6


Cyber Security (22334VIC) Information Session
Time: xx, Day: xx, Date: xx, 2019

a. Unshielded twisted-pair
b. Fiber-optic
c. Shielded twisted-pair
d. Coaxial
Question 26: What is the cp command used in Linux for?
a. Change process
b. Change priority
c. Copy
d. Copy permissions
Question 27: Which of the following will you use to see running process in Windows operating
system?
a. Control panel
b. Task manager
c. Event viewer
d. Firewall setting

Question 28: What is the pwd command used in Linux for?


a. Prints a word document
b. Changes the directory
c. Tells the current directory you are in
d. Create a new folder
Question 29: What is the minimum RAM requirement for windows 10 x64 installation?
a. 512 MB
b. 1 GB
c. 2 GB
d. 4 GB
Question 30: Which of the following devices will you use to detect and stop any unwanted event?
a. ACL
b. IPS
c. IDS
d. Switch
Question 30: Tell us in about 200 words about your expectation from Certificate IV in Cyber Security
course?
With knowledge of networking I would like to apply myself for the
course to gain wide application of IT skills.
ANS: ------------------------------------------------------------------------------------------------------------------------------
In this course I would be learning python language and different
--------------------------------------------------------------------------------------------------------------------------------------
linux flavour and in the combine, I would be learning to secure the
network, check the possible threats in network, toubleshoot/rectify
--------------------------------------------------------------------------------------------------------------------------------------
the unexpected events, test the network security and fix them and
--------------------------------------------------------------------------------------------------------------------------------------
Identify the occurrence of risk and take the action.
--------------------------------------------------------------------------------------------------------------------------------------

IT Section, Ultimo Campus Page 5 of 6


Apart for securing the network, I would be learning the best
Cyber Security (22334VIC) Information Session
Time: xx, Day: xx, Date: xx, 2019
Practises to protect the personal computer, data , web/internet
--------------------------------------------------------------------------------------------------------------------------------------
threats etc.
--------------------------------------------------------------------------------------------------------------------------------------
I would be learning different methods to communicate securely
--------------------------------------------------------------------------------------------------------------------------------------
with different network devices.
--------------------------------------------------------------------------------------------------------------------------------------

--------------------------------------------------------------------------------------------------------------------------------------

--------------------------------------------------------------------------------------------------------------------------------------

IT Section, Ultimo Campus Page 6 of 6

You might also like