Interactive knowledge checks for critical exam topics.
⭐ Worth 14% of the exam!
OSI Model & Encapsulation
Drag the layers from the bank into the correct order in the OSI Stack. Then, match the correct Protocol Data Unit (PDU) to Layers 4, 3, and 2.
Speed Run Challenge
How fast can you build the stack and match the PDUs?
00:00
Layer Bank
Network
Application
Physical
Session
Data Link
Presentation
Transport
OSI Stack
7
Drop Layer 7
Data
6
Drop Layer 6
Data
5
Drop Layer 5
Data
4
Drop Layer 4
Drop PDU
3
Drop Layer 3
Drop PDU
2
Drop Layer 2
Drop PDU
1
Drop Layer 1
Bits
All Layers Matched!
Here are two helpful exam mnemonics:
Top-Down (7 to 1):All People Seem To Need Data Processing
Bottom-Up (1 to 7):Please Do Not Throw Sausage Pizza Away
PDU Bank
Unlock Layer 4, 3, and 2 to match these PDUs.
Packet
Frame
Segment
Excellent!
Some People Fear Bears (Segments, Packets, Frames, Bits).
TCP vs UDP Attributes
Drag and drop the attributes into their correct protocol category.
Word Bank
Connection-oriented
Connectionless
3-Way Handshake
Reliable delivery
Lower overhead / Faster
Best-effort delivery
All sorted correctly!
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
HTTP Methods
Drag and drop the HTTP method to its correct description.
POST
DELETE
GET
PUT
Retrieve data/resources from a specified resource.
Submit data to be processed to a specified resource (often creates new data).
Update a current resource with new data or replace it entirely.
Remove the specified resource.
Network Logs & Evidence
Read the scenario and identify the BEST log source to find the required evidence.
Scenario 1 of 6
Loading scenario...
Analyzing User Agents
Hover over or click the parts of the User Agent string below to see what information they reveal to web servers and proxy logs.
Mozilla/5.0
(Windows NT 10.0;
Win64; x64)
AppleWebKit/537.36
(KHTML, like Gecko)
Chrome/114.0.0.0Safari/537.36
What do User Agents identify? (Checklist)
Operating System (OS) and exact version (e.g., Windows 10, macOS 13.1, Android 13).
Device Type / Architecture (e.g., Mobile, Tablet, Win64, ARM).
Browser Application and exact version (e.g., Chrome 114, Firefox 112).
Rendering Engine (e.g., AppleWebKit, Gecko).
Forensic Value: Attackers often use automated scripts or custom tools (like Python's requests library, Nmap, or curl) which have default User Agents. Spotting anomalous User Agents in web proxy or server logs is a primary method for hunting malicious beaconing or automated scanning!