CORRECT ANSWERS 2024 NEW
UPDATE
What are the typical steps in a penetration test? - Answer- 1. Planning and scoping
2. Reconnaissance
3. Scanning
4. Gaining access
5. Maintaining access
6. Analysis and reporting
What is the difference between open source and closed source software? - Answer-
Open Source: Source code is available for anyone to view, modify, and distribute.
Closed Source: Source code is not available to the public; only the original creators can
modify it.
What is the kernel in the Linux operating system? - Answer- The core component that
manages system resources, hardware, and communication between software and
hardware.
Attack Layers and the OSI Model - Answer- The OSI (Open Systems Interconnection)
model is a conceptual framework that standardizes the functions of a
telecommunication or computing system into seven distinct layers, facilitating
communication between diverse systems.
Layer 1: Physical LayerAttack: Wiretapping, eavesdropping on physical media.
Layer 2: Data Link LayerAttack: MAC spoofing, ARP spoofing.
Layer 3: Network LayerAttack: IP spoofing, DDoS (Distributed Denial of Service).
Layer 4: Transport LayerAttack: SYN flooding, port scanning.
Layer 5: Session LayerAttack: Session hijacking.
Layer 6: Presentation LayerAttack: Encryption attacks, data interception.
Layer 7: Application LayerAttack: Malware, DoS attacks, phishing.
TCP/IP Model - Answer- Definition: A set of communication protocols used for the
Internet, consisting of four layers.
Example: Application, Host-to-Host, Network, Physical.
, Application Layer (OSI) - Answer- Definition: The layer where network services and
applications operate.
Example: HTTP, FTP, SMTP.
Transport Layer (OSI) - Answer- Definition: Ensures complete data transfer and error
recovery.
Example: TCP (connection-oriented), UDP (connectionless).
Network Layer (OSI) - Answer- Definition: Manages logical addressing and routing of
data packets.
Example: IP, ICMP.
Data Link Layer (OSI) - Answer- Definition: Handles framing and MAC addressing.
Example: Ethernet, Wi-Fi.
Physical Layer (OSI) - Answer- Definition: The layer that transmits raw data bits over a
physical medium.
Example: Ethernet cables, DSL.
IPv4 vs. IPv6 - Answer- Definition: IPv4 is a 32-bit addressing scheme (4.3 billion
addresses); IPv6 is a 128-bit scheme (340 undecillion addresses).
Key Features:
IPv4: Dotted decimal notation (e.g., 192.168.1.1)
IPv6: Hexadecimal notation (e.g., 2600:1700:131:1ba0:...).
IPv4 Public vs. Private Routing - Answer- Definition: Public IPs are routable on the
internet; private IPs are used within local networks.
Examples:
Public IPs: 8.8.8.8 (Google DNS)
Private IPs: 192.168.0.0/16, 10.0.0.0/8.
TCP vs. UDP - Answer- Definition: TCP is connection-oriented and reliable; UDP is
connectionless and faster but less reliable.
Example: TCP (file transfer) vs. UDP (streaming media).
What is the difference between stream processing and block processing in symmetric
encryption? - Answer- Stream Processing: