You are on page 1of 5

CCTC Networking exam containing

verified questions and answers latest


2024

LLC and MAC

✓ Are the sub-layers of the data link layer

0x45

✓ Is the value typically in the first byte of an IPv4 header

TTL of Linux

✓ 64

TTL of Windows

✓ 128

ARP operates at which layer of the OSI Model

✓ Data Link layer 2

DNS

✓ 53

HTTPS

✓ 443

DHCP

✓ 67 | 68

FTP

✓ 20 | 21

What type/code is the initial ping request

✓ 8/0

What type/code is the ping response

✓ 0/0

An ICMP response that is not sent when a packet is dropped by an ACL


✓ Destination network unreachable

APIPA address

✓ 169.254.0.0/16

RFC 1918 addresses

✓ Private addresses, cannot be routed over the internet


10.0.0.0 - 10.255.255.255 (The Ten Dot Network)
172.16.0.0 - 172.31.255.255
192.168.0.0-192.168.255.255

Data at the session layer is encapsulated how many times before it becomes bits?

✓ 3 times

Two common layer three protocols are

✓ ICMP and IPv6

Transport Layer

✓ The fourth layer of the OSI model. In this layer protocols ensure that data are transferred from
point A to point B reliably and without errors. -Segments

Physical Layer

✓ The first layer of the OSI model. Protocols in this layer generate and detect signals so as to
transmit and receive data over a network medium. - Bits

Data Link Layer

✓ The second layer in the OSI model. This layer bridges the networking media with the Network
layer. -Frames

FE80::/10

✓ Link-Local Unicast

::1/128

✓ Loopback

Echo Reply

✓ A type 0 ICMP message used to reply to ECHO requests

Destination Unreachable

✓ ICMP message type 3


Redirect

✓ ICMP Type 5

Echo Request

✓ ICMP message type 8

Time Exceeded

✓ ICMP type 11

Traceroute

✓ ICMP type 30

ICMP decimal

✓ 0x1

TCP decimal

✓ 0x6

UDP decimal

✓ 17 0x11

TCP header Syn flag (hex)

✓ 0x02

TCP header syn-ack flag (hex)

✓ 0x12

TCP header ack flag (hex)

✓ 0x10

SYN Scan

✓ Half-open scanning

ACK Scan

✓ Used to check port filtering

Linux host responds to a stealth scan

✓ closed -RST Open -no response

Windows host responds to a stealth scan

✓ Closed | Open -RST


Advantages of UDP scans

✓ can penetrate TCP stateful firewalls

NC listener to send a file

✓ nc -l -p 1234 < file.txt

NC setup to receive a file

✓ nc 1.1.1.1 1234 > file.txt

Packet Filter Firewall

✓ L2-L3 data-Network

stateful firewall

✓ L4 transport

Application Firewall

✓ performs deep packet inspection

Standard ACL Range

✓ 1-99 and 1300-1999

Extended ACL Range

✓ 100-199 and 2000-2699

Cyber Kill Chain (Step 1)

✓ Reconnaissance

Cyber Kill Chain (Step 2)

✓ Weaponization

Cyber Kill Chain (Step 3)

✓ Delivery

Cyber Kill Chain (Step 4)

✓ exploitation

Cyber Kill Chain (Step 5)

✓ Installation

Cyber Kill Chain (Step 6)

✓ Command and Control


Cyber Kill Chain (Step 7)

✓ Actions & Objectives

ICS zones Purdue model (level 0)

✓ Process

ICS zones Purdue model (level 1)

✓ Basic Control

ICS zones Purdue model (level 2)

✓ Area Supervisory Control

ICS zones Purdue model (level 3)

✓ Site Manufacturing Operations and Control

ICS zones Purdue model (level 4)

✓ Site Business Planning and Logistics Network

ICS zones Purdue model (level 5)

✓ Enterprise Network

Profibus

✓ layer 2 protocol used between controllers, sensors, and actuators

OPC

✓ OPC and OPC UA are used to bridge between IT and OT networks.

You might also like