Demented Pears
Core Networking
Transferring Data
Security
Conversions and Segments
100

This OSI layer is where IP addressing occurs

Network

100

An IPv4 address has this many bits

32

100

Wireless Fidelity runs on one of these frequency bands

2.4 GHz or 5 GHz

100

This is the 'C' in the CIA triad

Confidentiality

100

The decimal number 255 corresponds with this binary number

11111111

200

This layer handles MAC addressing

Data Link

200

A private IPv4 address typically begins with this number

192

200

These cables transmit data using light

Fiber-optic

200

This security threat involves locking files until payment is made

Ransomware

200

192.168.1.20/28

/28 in the above IP address is known as this

CIDR notation

300

This is the correct OSI order from Top to Bottom

Application

Presentation

Session

Transport

Network

Data Link

Physical


300

This protocol maps URLs to IP addresses

DNS

300

This physical topology connects all devices to a central switch

Star

300

This refers to employees using personal devices on the company's network

BYOD

300

Network, host, or broadcast. 

10.0.8.0/21 belongs to which address group

Network

400

Bits on the wire are handled by this OSI layer

Physical

400

DHCP assigns this

IP Addresses

400

FHSS is used by this wireless technology

Bluetooth

400

This type of encryption uses a public key and a mathematically related private key

Public Key Encryption

Asymmetric Cryptography

400

This is hex C converted to decimal

12

500

This layer number is where TCP segmentation happens

Layer 4

500

An ARP table maps

________ to _________

IP to MAC address

500

The actual amount of data received is known as this

Throughput

500

This list will allow a router to block or allow traffic based on rules

ACL

Access Control List

500

This the the number of usable hosts in a subnet that uses the last octet of an IP address

254

M
e
n
u