Networking Basics
OSI Model Layers
Cybersecurity Concepts
Security Tools
Random Facts
100

This device manages traffic between two or more networks.

What is a router?

100

HTTP and HTTPS operate at this OSI model layer.

What is the Application Layer?

100

Exploiting an undiscovered software vulnerability is known as this type of attack.

What is a Zero-Day Attack

100

This tool is a decoy system designed to attract attackers.

What is a Honeypot?

100

This term combines "malicious" and "software."

What is Malware?

200

This network model has client computers that do not share resources directly with each other.

What is the Client-Server Model?

200

This layer involves the 3-way handshake process.

What is the Transport Layer?

200

This term describes a minor issue causing degraded system performance.

What is a fault?

200

This type of firewall operates without maintaining session information.

What is a Stateless Firewall?

200

This is the recommended frequency for password changes to maintain security.

What is every 60 days?

300

True or False: RAID 0 provides fault tolerance.

What is False?

300

Routers operate at this OSI model layer.

What is the Network Layer?

300

SSH keys are more secure than this common authentication method.

What are passwords?

300

This system reacts to suspicious activity by blocking threats.

What is an Intrusion Prevention System (IPS)?

300

This attack intercepts and captures secure communications.

What is a Man-in-the-Middle Attack?

400

This networking concept involves splitting a network to improve security and reduce broadcast domains.

What is VLAN?

400

ARP and MAC are found at this OSI model layer.

What is the Data Link Layer?

400

This principle limits access and privileges to only what is necessary for a job.

What is the Principle of Least Privilege?

400

This penetration testing tool combines scanning and exploit techniques.

What is Metasploit?

400

True or False: WANs connect nodes in a small geographical area.

What is False?

500

What is the maximum number of host IP addresses in a Class B network?

What is 65k?

500

Layer 2 switches operate at this OSI layer, which is also known by this number.

What is Layer 2?

500

Malware that activates based on a specific condition is called this.

What is a Logic Bomb?

500

This integrates firewall, intrusion detection, and antivirus into a single device.

What is Unified Threat Management (UTM)?

500

True or False: Network segmentation decreases both performance and security.

What is False?

M
e
n
u