A unit of data that is ready to be sent on the network medium.
Frame
LED light, or lights on network adapters or switches, that indicate the status of the physical link.
Link light
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules.
Firewall
A unit of data that is ready to be sent on the network medium.
Frame
What were the names of Patrick's fake parents from the episode "I'm With Stupid"?
Janet and Marty
A unique identifier (address) that is burned into every network interface card (NIC).
Media access control (MAC) address
A network topology where all nodes in the network are connected to a cable (called a bus).
Bus topology
Firewalls use filtering rules, which are sometimes called this, to identify allowed and blocked traffic.
Access control list (ACL)
A buffer network (or subnet) that sits between the private network and an untrusted network (such as the internet.) Also known as an all-in-one appliance.
Screened Subnet
What type of spatula is SpongeBob tasked with finding in the first episode, "Help Wanted"?
Hydrodynamic Spatula with Port and Starboard Attachments and Turbo Drive
Connects each wire to the same pin on each connector (pin 1 to pin 1, pin 2 to pin 2, etc.).
Straight-through cable
A network topology in which every node in the network is connected to a central node (either a hub or a switch) in a spoke-and-hub organization.
Star topology
A buffer network (or subnet) that sits between the private network and an untrusted network (such as the internet.) Also known as an all-in-one appliance.
Screened subnet
Firewalls use filtering rules, which are sometimes called this, to identify allowed and blocked traffic.
Access Control List (ACL)
Who were the members of the villain team E.V.I.L. in the episode "Mermaid Man and Barnacle Boy V" and what does E.V.I.L. stand for?
Man Ray, The Dirty Bubble, and Barnacle Man, and it stands for Every Villain Is Lemons.
Matches the transmit (Tx) wires on one connector with the receive (Rx) wires on the other connector.
Crossover cable
A network topology in which every node is connected to two other nodes in a closed circular organization where data travels through every node.
Ring topology
combines several layers of security and networking services into one solution. It is also known as an all-in-one appliance.
Unified threat management (UTM)
A description of how computers and links are connected on a network (physical topology) and the flow of data (logical topology).
Network topology
Name all the rooms in SpongeBob's House (not including the roof or any closets).
Living Room, Kitchen, Downstairs Bathroom, Upstairs Bathroom, Library, and Garage.
A type of null-modem cable that is used to connect a computer terminal to a router's console port. Might also have an RJ45 connector on both ends, requiring an adapter to convert from the RJ45 connector to the serial cable.
Rollover cable
A network topology in which every node is connected to every other node in the network to create redundancy.
Mesh topology
A device or software that monitors, logs, and detects security breaches but takes no action to stop or prevent the attack.
Intrusion detection system (IDS)
A device that monitors, logs, detects, and reacts to stop or prevent security breaches.
Intrusion prevention system (IPS)
What is Bubble Bass's order in the episode "Pickles"?
a Double Triple Bossy Deluxe, on a raft, four-by-four animal-style, extra shingles with a shimmy and a squeeze, light axle grease, make it cry, burn it, and let it swim.