Physical Network Security
Network Security
Network Troubleshooting
Disaster Recovery and Documentation
Misc
100

What physical security measure involves restricting access to server rooms, network closets, and other critical infrastructure locations?

Access control

100

What term describes an individual who lacks technical expertise but uses ready-made hacking tools and scripts to launch attacks?

Script Kiddie

100

This term refers to the process of identifying, diagnosing, and resolving problems within a computer network.

Network Troubleshooting

100

A key performance indicator in network management, stands for this metric, which measures the average time taken to repair a failed component or system after an incident occurs.

MTTR

100

This network device operates at Layer 3 of the OSI model and is used to forward data packets between different networks based on IP addresses.

A router

200

What type of cable is commonly used for physically securing laptops and other portable devices to a fixed object to prevent theft?

A Kensington lock or security cable

200

What term describes a government or state-sponsored entity that conducts cyber attacks for political, military, or economic purposes also known as a type of APT?

Nation State

200

This command-line utility is used to display network connectivity information including IP address, subnet mask, and default gateway on Windows operating systems.

ipconfig

200

A crucial metric in network reliability, stands for this term, representing the average time between the failures of a component or system, typically measured in hours.

MTBF

200

This protocol, often used for secure remote access to network resources, operates over TCP port 22 and provides encrypted communication between clients and servers.

SSH

300

What are three types of biometrics used in MFA? 

fingerprints, iris patterns, and facial features.

300

What term describes a targeted form of phishing where attackers customize emails or messages to specific individuals or organizations to increase the likelihood of success?

Spear Phishing 

300

This device is used to test the continuity and integrity of copper Ethernet cables by sending signals through the cable and detecting any breaks or faults.

cable tester

300

The practice of combining multiple network interface cards (NICs) into a single logical interface to increase bandwidth, redundancy, and fault tolerance in a network. 

NIC Teaming

300

This type of attack involves flooding a network with excessive traffic or requests, causing it to become overwhelmed and unable to process legitimate requests

DoS Attack

400

In physical network security, what is the term for the process of preventing unauthorized individuals from unauthorized access to a secure location?

Access control vestibule or mantrap.

400

What type of malicious software disguises itself as a legitimate program to trick users into installing it, allowing attackers unauthorized access to the victim's system?

Trojan Horse

400

What are the steps to network troubleshooting?

Identify the problem

Establish a theory

Test the theory

Implement the solution

Verify functionality

Document findings, actions, outcomes, lessons learned


400

This comprehensive plan outlines the procedures and strategies an organization will follow to recover and restore IT infrastructure, data, and operations in the event of a disaster or disruption. 

DRP, Disaster Recovery Plan

400

IPv6 uses this type of addressing scheme, which allows for a significantly larger number of unique addresses compared to IPv4.

128 bit, Hexadecimal address

500

This physical network security strategy, often likened to the layers of an onion, emphasizes the deployment of multiple layers of security controls to protect against various types of threats.

Defense in depth

500

What term describes a network of compromised computers or devices controlled by a single entity, often used to carry out coordinated attacks, distribute malware, or send spam?

Botnet

500

This device is often deployed in network troubleshooting scenarios to intercept, log, and analyze network traffic passing through it for diagnostic and security purposes.

network sniffer or packet analyzer

500

A ___________ in disaster recovery refers to this type of off-site location equipped with necessary hardware, software, and infrastructure to quickly resume operations following a disaster, often featuring real-time data replication and near-immediate availability. 

Hot Site

500

This term refers to the process of borrowing bits from the host portion of an IP address to create multiple subnetworks, allowing for efficient use of IP address space within an organization.  

Subnetting
M
e
n
u