This device manages traffic between two or more networks.
What is a router?
HTTP and HTTPS operate at this OSI model layer.
What is the Application Layer?
Exploiting an undiscovered software vulnerability is known as this type of attack.
What is a Zero-Day Attack
This tool is a decoy system designed to attract attackers.
What is a Honeypot?
This term combines "malicious" and "software."
What is Malware?
This network model has client computers that do not share resources directly with each other.
What is the Client-Server Model?
This layer involves the 3-way handshake process.
What is the Transport Layer?
This term describes a minor issue causing degraded system performance.
What is a fault?
This type of firewall operates without maintaining session information.
What is a Stateless Firewall?
This is the recommended frequency for password changes to maintain security.
What is every 60 days?
True or False: RAID 0 provides fault tolerance.
What is False?
Routers operate at this OSI model layer.
What is the Network Layer?
SSH keys are more secure than this common authentication method.
What are passwords?
This system reacts to suspicious activity by blocking threats.
What is an Intrusion Prevention System (IPS)?
This attack intercepts and captures secure communications.
What is a Man-in-the-Middle Attack?
This networking concept involves splitting a network to improve security and reduce broadcast domains.
What is VLAN?
ARP and MAC are found at this OSI model layer.
What is the Data Link Layer?
This principle limits access and privileges to only what is necessary for a job.
What is the Principle of Least Privilege?
This penetration testing tool combines scanning and exploit techniques.
What is Metasploit?
True or False: WANs connect nodes in a small geographical area.
What is False?
What is the maximum number of host IP addresses in a Class B network?
What is 65k?
Layer 2 switches operate at this OSI layer, which is also known by this number.
What is Layer 2?
Malware that activates based on a specific condition is called this.
What is a Logic Bomb?
This integrates firewall, intrusion detection, and antivirus into a single device.
What is Unified Threat Management (UTM)?
True or False: Network segmentation decreases both performance and security.
What is False?