The physical "Fingerprint" of a network card that never changes.
What is a MAC Address?
Used to connect different networks (subnets) together.
What is a Router?
The strategy where we assume every connection is a threat and "never trust, always verify.
What is Zero Trust?
The modern protocol that protects traffic in transit.
What is TLS?
The black box where professionals type commands instead of using a mouse.
What is the CLI? (Command Line Interface)
Who automatically assigns IP addresses to devices.
What is DHCP?
The "Invisible Walls" that organize a switch logically without extra hardware.
What is a VLAN?
An attack where the hacker "Poisons" a table to link their MAC to the Gateway
What is ARP Spoofing?
A list used by a firewall to Inspect, Compare, and Act
What is an ACL? (Access Control List)
This specific port number is used for Secure Web Traffic.
What is Port 443 / HTTPS?
Allows multiple private devices to share one public IP.
What is NAT?
The "Silent Observer" sitting between two parties to steal or alter data.
What is Man-in-the-Middle?
This model uses 4 practical layers to explain how the internet actually functions
What is the TCP/IP Model?
The Layer of the OSI model where Cables, Hubs, and Bits live.
What is the Physical Layer / Layer 1?
What is this address?
2001:0:3238:DFE1:63::FEFB
What is IPv6?
The wireless network that lets your phone or laptop connect to the internet without cables
What is Wi-Fi?
Changing "Phonebook" entries to redirect users to a fraudulent website
What is DNS Poisoning?
This legacy protocol is the unsecure version of Port 443.
What is HTTP / Port 80?
The primary goal of a DMZ is to prevent an attacker from moving from the internet to this.
What is the Internal / Private Network?
The 32-bit number that defines which part of an IP belongs to the network vs. the host.
What is a Subnet Mask?
A device that works at Layer 2 and uses MAC addresses to forward data to specific ports.
What is a Switch?
In Zero Trust, this principle means giving users only the minimum access they need to do their job.
What is Least Privilege?
The process of locking data so only authorized people can access it.
What is Encryption?
A secure, encrypted "Tunnel" that allows remote users to join a private network safely.
What is a VPN? What is a VPN?