what is social engineering?
The process of taking advantage of the trust of others in order to gain information.
What command is used to encrypt a password?
serv pass
Which topology has devices that connect to a single point.
Star topology
a device that connects devices on a local network.
What is a switch
How many bits make up an IPV4 IP address?
What is 32 bits?
what is smishing?
Smishing is a type of phishing attack that uses text messages to trick people into sharing personal information.
What is a command used to configure a port?
int g0/0/0 or int fa0/1
What is a topology where devices are connected in a loop?
Ring topology
a network device that is similar to a router, only it has its own built-in antenna, transmitter and adapter.
What is a access point
What is pharming?
Pharming (“farming” + “phishing”) is a kind of social engineering cyberattack in which criminals redirect internet users trying to reach a specific website to a different, fake site.
How do you configure router rip?
#router rip -> #network [ip address]
What is a Topology with optimal routing and is always available because every node connects to every other node?
Full mesh topology
What is a bridge used for
to connect hosts or network segments together.
What is vishing?
Vishing is short for "voice phishing," which involves defrauding people over the phone, enticing them to divulge sensitive information.
how do you configure a router to act as a dhcp server?
#ip dhcp pool [name] -> #network [net address] [subnet mask] -> #default-router [default gateway]
What is an interconnection of different types of nodes, devices, or radios.
Wireless mesh topology
This is a hardware component that enables a device to connect to an Ethernet network.
What is a NIC
What is spear phishing
Spear-phishing is a type of phishing attack that targets specific individuals or organizations typically through malicious emails.
How do you create and name a vlan?
#Vlan [vlan number] -> name [vlan name]
This topology uses a single cable where each device taps into by using either a vampire tap or a T- connector.
Bus topology
A group of devices sharing resources located on or provided by network nodes
What is a computer network