This is a collection of interconnected devices that can communicate with each other
A Network
VPN is an acronym for...
Virtual Private Network
What is a type of malware that encrypts files and demands a ransom?
Ransomware
What is a security device that monitors and controls network traffic?
Firewall
In Europe, what is a soccer field called?
A pitch
This Network Device can be inserted wirelessly, or wired, and connects ones personal device to the network
NIC
What is the main purpose of a VPN?
To create a secure connection over an untrusted network
What is a technique used to manipulate people into revealing sensitive information?
Social engineering
What is malicious software designed to harm computers or networks?
Malware
How many points is a field goal worth?
3
This device is, Simpler and cheaper than switches., and is suitable for small networks with minimal traffic.
Hub
How does a VPN encrypt data?
A VPN encrypts data using cryptographic algorithms.
What is a vulnerability that is unknown to the software vendor?
Zero-day exploit
What is a deceptive technique used to trick people into disclosing personal information?
Phishing
What is the body's largest organ?
How many layers are in a basic network?
7
What is a VPN tunnel?
A VPN tunnel is a secure, encrypted connection between two devices.
What is a network of compromised computers controlled by a malicious actor?
Botnet
What is an attack that floods a network with traffic, making it inaccessible?
Denial-Of-Service Attack (DOS)
Which country was Alaska bought from?
Russia
The two main types of networks based on their geographic scope
LAN and WAN
This type of firewall/VPN protects web servers and databases from specific web application attacks
Web Application Firewall (WAF)
What is the difference between a threat and a vulnerability?
A threat is a potential danger, while a vulnerability is a weakness that can be exploited.
What is a weakness in a system that can be exploited by attackers?
Vulnerability
Wayne Gretzky