Michigan Cyber Range

All Schools in Michigan Are Invited to Participate
Teams, each comprised of three high school students, are invited to participate in a round of challenges designed to test their knowledge of cybersecurity, computer science and information technology.

The only requirement is an interest in cyber security and a familiarity with computers. This is a great cyber security learning opportunity for all high school students in Michigan.

1st Day of Each Month
View MAY Questions

October 2-5, 2017
Register for Round ONE

North American International Cyber Summit
Detroit, MI
October 30, 2017
New for 2017! On the first day of the month, March through August, we will be releasing 10 new questions. (See questions below.) Get together as a group or work individually to answer the questions. Check back first day of next month to see the answers. No scores are tabulated, theses challenges are non-qualifying. Round Zero is just a great way to get students talking about cybersecurity and preparing for Round One. Pop in and out at anytime, just to practice.

The first round will be completely held online and will be scored by staff of the Michigan Cyber Range. The challenges will be released Mon.-Thurs. during October 2-5, 2017. Students have between 1:00pm-6:00pm ET each day to answer the 20 multiple choice questions. In the case of a tie, completion times will be considered.

The daily challenges will focus on networks, programming, operating systems and hacking. Round One is an open book style in which students are encouraged to scour the internet to solve the challenges. The top ten teams will be selected to advance to Round Two. Winning teams will be announced on October 6, 2017. Teams must be comprised of three students and one adult coach. Schools may have more than one team.

Efforts expended by the students in Round One will prepare the them for Round Two. The second round will take place at the North American International Cyber Summit (NAICS) at Cobo Center in Detroit, October 30, 2017. Travel and accommodation funds are available for teams traveling from outside the area.

During Round Two, teams will compete in a virtual Capture the Flag exercise designed to test their skills with an intensive, timed series of cybersecurity-focused challenges. Round 2 is an exercise in gamified learning. The focus will be hacking the virtual city of Alphaville. In this round, the students will be able to interact with each other and compare each others progress on a public scoreboard. In the event of a tie, the Michigan Cyber Range will measure team strategy to determine the winner.

The top three teams from Round Two will receive special awards from Governor Snyder, or his designee, during the NAICS.



1.) Which protocol and port number is used by default for a mail filter?
a.) SMTP – 25
b.) RDP – 53
c.) HTTP – 123
2.) How many usable IP address are in a network with a subnet of /24 (The netmask is
a.) 96
b.) 24
c.) 254
3.) Provide the broadcast address for the following: IP Address:, Subnet mask:
4.) A ________ in computer networking is the node that is assumed to know how to forward packets on to other network.
a.) Default Gateway
b.) Web server
c.) Netmask
5.) Which of the DNS database records listed below returns a 32-bit IPv4 address?
a.) PTR
c.) A
6.) Which of the following DNS database records maps a domain name to a list of mail servers for that domain?
a.) PTR
b.) MX
d.) AAAA
7.) Select 1 of the following statements that best describe the function of a DNS server?
a.) They store and manage information about network resources, users, computers, and printers.
b.) They can respond to clients with the current availability of server services.
c.) They provides name resolution for TCP/IP-based networks using port 53.
d.) They are used to transfer files between a client and server on port 21.
8.) An area between a private network (Intranet) and a public network (extranet) such as the Internet is known as a ______.
a.) Firewall
b.) Server side
c.) DMZ
9.) _______displays a list of a computers active incoming and outgoing connections.
a.) Netstat
b.) Nslookup
c.) Tracert

10.) What is the maximum length of a 10GBaseLR single mode fiber link?
a.) 400 Meters
b.) 1000 Meters
c.) 10 Kilometers
c.) 50 Kilometers


1.) In a bash script, how would you store the value of 1 in the variable ‘i’?
a.) i = 1;
b.) i=1;
c.) i=0;
2.) In a bash script, how would you access the value of a variable named ‘i’?
a.) i
b.) $i
c.) “i”
3.) In a bash script, how would you loop over a statement while a variable named ‘i’ was still less than 101?
a.) while [ $i -lt 101 ]
b.) while [ i -lt 101 ]
c.) while [ i < 101 ]
4.) Write a simple script with bash’s while statement to sum the numbers from 1 to 100, inclusive?
a.) i=1; j=0; while [ $i -lt 100 ]; do; j=`expr $j + $i`; ((i++)); done; echo $j;
b.) i=1; j=0; while [ $i -lt 101 ]; do; j=`$j + $i`; ((i++)); done; echo $j;
c.) i=1; j=0; while [ $i -lt 101 ]; do; j=`expr $j + $i`; ((i++)); done; echo $j;
5.) Sometimes you just want something to run forever. How would you go about setting up a while loop to loop forever using bash?
a.) while [ $VARB -le 1000000000000 ]
b.) while [ 1 ]
c.) while [ ]
6.) In Windows, using a PowerShell script, how would you store the value of 1 in the variable “i”?
a.) i = 1;
b.) i := 1
c.) i => 1
d.) $i = 1
7.) In a PowerShell script, which option wouldn’t access the value of a variable named
a.) i
b.) $i[0]
c.) ($i)
d.) $i
8.) Write a simple script with PowerShell’s while statement to sum the numbers between 1 and 100.
a.) $i=1; $j=0; Do{ $j += $i++; }While ( $i -lt 100 ); echo $j;
b.) $i=1; $j=0; Do{ $j += $i++; }While ( $i -lt 101 ); echo $j
c.) $i=0; $j=0; Do{ $j += $i+++; }While ( $i -lt 100 ); echo $j
9.) In a PowerShell script, what’s the shortest way to write incrementing a variable ‘i’ by 1, each time through a while loop?
a.) i = i + 1;
b.) $i = $i + 1;
c.) i++;
d.) $i++;

10.) One of the things you might need to be assured of while working a problem, is that a particular server on the network is still responding to pings. Using ‘fping’, and a while loop, looping forever, what would a script print out if a router you needed were still responding to queries?
a.) “router is alive” in the upper left of the terminal
b.) “router is alive” as scrolling lines, down the left side of the screen
c.) The IP address of host router, plus ping statistics, scrolling down the right side of the terminal


1.) Software that allows the operating system to talk to the computer hardware is called a:
a.) IO file
b.) certificate
c.) interface
d.) driver
2.) In Windows, the operating system stores its files in a database known as what?
a.) Hive
b.) Oracle
c.) Registry
d.) Register
3.) At the command line, what is the command to list the contents of a directory in Windows?
a.) ls
b.) cd
c.) grep
d.) dir
4.) What operator do you use to redirect the output of a command to a file?
a.) >
b.) |
c.) &
d.) @
5.) What user account has the highest level of access in Linux?
a.) Admin
b.) System
c.) MCP
d.) root
6.) In Linux, which command line tool would you use to search through the contents of a file?
a.) cat
b.) grep
c.) ifconfig
d.) Regex
7.) What operator do you put after a command in Linux to have it run in the background?
a.) >
b.) |
c.) &
d.) @
8.) The program that makes up the core of an operating system is called the:
a.) root
b.) core
c.) CPU
d.) Kernel
9.) There is a four letter abbreviation (NTFS) for the type of file system used by Windows. What does the abbreviation stand for?
a.) New Technology File System
b.) Network Transfer File System
c.) Network Technology File System
d.) New Transfer File System

10.) What command would you use to give the file owner write permissions to a file named apache.log?
a.) chmod o-rx apache.log
b.) chmod o+w apache.log
c.) chmod u+w apache.log
d.) chmod u-rx apache.log

Check Back on May 1st for April's Answers and 10 New Questions

Interested in Sponsoring the
Governor’s High School Cyber Challenge?


Contact Merit with Your Questions About the High School Cyber Challenge