What physical security measure involves restricting access to server rooms, network closets, and other critical infrastructure locations?
Access control
What term describes an individual who lacks technical expertise but uses ready-made hacking tools and scripts to launch attacks?
Script Kiddie
This term refers to the process of identifying, diagnosing, and resolving problems within a computer network.
Network Troubleshooting
A key performance indicator in network management, stands for this metric, which measures the average time taken to repair a failed component or system after an incident occurs.
MTTR
This network device operates at Layer 3 of the OSI model and is used to forward data packets between different networks based on IP addresses.
A router
What type of cable is commonly used for physically securing laptops and other portable devices to a fixed object to prevent theft?
A Kensington lock or security cable
What term describes a government or state-sponsored entity that conducts cyber attacks for political, military, or economic purposes also known as a type of APT?
Nation State
This command-line utility is used to display network connectivity information including IP address, subnet mask, and default gateway on Windows operating systems.
ipconfig
A crucial metric in network reliability, stands for this term, representing the average time between the failures of a component or system, typically measured in hours.
MTBF
This protocol, often used for secure remote access to network resources, operates over TCP port 22 and provides encrypted communication between clients and servers.
SSH
What are three types of biometrics used in MFA?
fingerprints, iris patterns, and facial features.
What term describes a targeted form of phishing where attackers customize emails or messages to specific individuals or organizations to increase the likelihood of success?
Spear Phishing
This device is used to test the continuity and integrity of copper Ethernet cables by sending signals through the cable and detecting any breaks or faults.
cable tester
The practice of combining multiple network interface cards (NICs) into a single logical interface to increase bandwidth, redundancy, and fault tolerance in a network.
NIC Teaming
This type of attack involves flooding a network with excessive traffic or requests, causing it to become overwhelmed and unable to process legitimate requests
DoS Attack
In physical network security, what is the term for the process of preventing unauthorized individuals from unauthorized access to a secure location?
Access control vestibule or mantrap.
What type of malicious software disguises itself as a legitimate program to trick users into installing it, allowing attackers unauthorized access to the victim's system?
Trojan Horse
What are the steps to network troubleshooting?
Identify the problem
Establish a theory
Test the theory
Implement the solution
Verify functionality
Document findings, actions, outcomes, lessons learned
This comprehensive plan outlines the procedures and strategies an organization will follow to recover and restore IT infrastructure, data, and operations in the event of a disaster or disruption.
DRP, Disaster Recovery Plan
IPv6 uses this type of addressing scheme, which allows for a significantly larger number of unique addresses compared to IPv4.
128 bit, Hexadecimal address
This physical network security strategy, often likened to the layers of an onion, emphasizes the deployment of multiple layers of security controls to protect against various types of threats.
Defense in depth
What term describes a network of compromised computers or devices controlled by a single entity, often used to carry out coordinated attacks, distribute malware, or send spam?
Botnet
This device is often deployed in network troubleshooting scenarios to intercept, log, and analyze network traffic passing through it for diagnostic and security purposes.
network sniffer or packet analyzer
A ___________ in disaster recovery refers to this type of off-site location equipped with necessary hardware, software, and infrastructure to quickly resume operations following a disaster, often featuring real-time data replication and near-immediate availability.
Hot Site
This term refers to the process of borrowing bits from the host portion of an IP address to create multiple subnetworks, allowing for efficient use of IP address space within an organization.