This is the most common type of cabling used in networks today.
What is copper cabling?
FF-FF-FF-FF-FF MAC Address Represents this
What is Broadcast MAC Address
This is what IGP stands for
interior gateway protocol or Interior routing protocol
44 in binary
00101100
This is the number of security customers that Cisco has.
300,000
This is the type of connector that UTP cables are terminated with.
What are RJ-45 connectors?
OUI stands for this.
What is an Organizationally Unique Identifier?
This is the standard communication protocol used for the transfer of computer files from a server to a client on a computer network
What is FTP?
44 in hexadecimal
2C
This threat involves software being used to gain unauthorized access to a computer system.
What is malware?
This is the cable that attached antennas to wireless devices.
what are coaxial cables?
An IPv6's MAC Address Length is this
What is 128 bits?
What is the difference between TCP and UDP?
TCP is a connection-based protocol and UDP is connectionless
120 in hexadecimal and binary
78 hex, 01111000 binary
What is the difference between and IPS and a firewall?
an IPS detects and notifies a system admin of an attack (depending on configuration), while a firewall performs actions such as blocking and filtering traffic.
These are the 4 key features of a STP cable.
What is the outer jacket, braided or foil shield, foil shield, and twisted pairs?
An IPv4 Subnet Mask is used to do this
What is to differentiate the network portion of the address from the host portion
This address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment
What is a MAC address?
149.19.41.154 in binary
10010101.00010011.00101001.10011010
These are two core functionalities of DNS layer security.
Live threat intelligence, proxy & file inspection
This type of cable counters EMI and RFI by using shielding techniques and special connectors.
What is a STP cable?
MAC Address is often referred to a Burned-In-Address (BIA) because the address is hardcoded into this
What is read-only memory on the NIC?
This is a network protocol used to automate the
process of configuring devices on IP networks
What is DHCP?
AC-D9-50-A5-FF-69 in decimal
172-217-80-165-255-105
This is the flaw that an attacker leverages when exploiting SQL injection vulnerabilities.
What is user input validation in a web page on web applications.