Page 57 - Cybersecurity Career Guide, 4th Edition
P. 57

  Reasoning
6. You have a basket with 15 mini chocolate bars in it. You also have 15 friends who all want one. After giving all 15 of your friends one mini chocolate bar, there is still one mini chocolate bar in the basket! How can this be?
7. Five people got on a bus at five different stops. Iris got on before Rick, but after Victor. Ursula got on before Sammi, but after Rick. What was the order of people getting on the bus? What else do you notice about this order of names?
8. The day before two days after the day before tomorrow is Wednesday. What day is it today?
Attention to Detail
9. In a computer program, valid combinations of data
are 5 characters long which start with a letter and finish with a letter. In between numbers or letters may be used. Identify from the below, which line contains
a violation of this pattern.
Line1: A123B C546D m874A P461N M938A v847F Line 2: x82aC D546j z834A 7421N y935B k142q Line3: A123B Ca46D m474A P411N Mj38A v8b7F Line 4: x82aC D566j z8f4A h4x1N y93aB k122q
10. On a network, each computer has a special address called an IP address. In IPv4 the addresses must take the form [0-255].[0-255].[0-255].[0-255]. A valid IPv4 address for example is ‘192.168.13.2’. Look at the below blocks of IP addresses. Which block, if any, contains an invalid IP address?
⊲ End with a special character (e.g., !, @, #).
⊲ Can contain any combination of letters, numbers,
and special characters in between.
Which of the following passwords violates this pattern?
Password 1: A1b2c3d4! Password 2: xYz9876# Password 3: AbC12@34 Password 4: 1234abcd Password 5: !abcdEFGH
12. In an email address validation system, valid email addresses must meet the following criteria:
⊲ Start with a combination of letters and numbers. ⊲ Followed by the “@” symbol.
⊲ Followed by a domain name (e.g., example.com).
Which of the following email addresses violates this pattern?
Email 1: Email 2: Email 3: Email 4: Email 5:
user123@example.com _user@example.com
123user@123example.com user@example.com123 user@_example.com
 ANSWERS
1) 14. The digits of the 1st and 3rd numbers add up to the 2nd
number. 1, 4, and 9 add up to 14, as do 7 and 7.
2) 8. Multiply the digits of each number to get the next one in
sequence. 1 x 8 = 8..
3) 2, and 5. Consecutive odd numbers are the difference between
each figure in the sequence. 2 + 3 = 5; 5 + 5 = 10; 10 + 7 = 17; and so on.
4) foot; slow; cheese
5) hONEst; arTWOrk; frEIGHTer; femiNINE; atTENtion
6) You gave the last friend of yours both the basket AND the mini
chocolate bar.
7) Victor; Iris; Rick; Ursula; Sammi. Their initials spell out VIRUS.
8) Tuesday. The “day before tomorrow” is today, and the “day before
two days after” this time is really just “one day” after. So if “one day”
after today is Wednesday, then today is Tuesday.
9) Line 2 (7421N is the violation)
10) Block 2 (200.1.3.1.1 is the violation)
11) Passwords 3 (does not end with special character), 4 (starts
with a number, does not end with a special character), and 5 (starts
with a special character, does not end with a special character).
12) Emails 2 (does not start with letter or number), 4 (does not end
with a valid domain name), 5 (does not end with a valid domain
name).
Block 1
192.168.1.3 192.168.2.7 192.1.4.9 172.16.4.3 194.13.2.2
Block 2
10.10.0.3 10.1.6.4 254.250.1.1 200.1.3.1.1
Block 3
14.17.1.1 192.1.5.1 192.192.1.4 221.122.1.4
Block 4
10.10.16.4 192.168.4.3 172.16.9.8 4.4.4.8
11. In a password validation system, valid passwords must meet the following criteria:
⊲ Be at least eight characters long. ⊲ Start with a letter.
 CYBERSECURITY CAREER GUIDE 57











































   55   56   57   58   59