OSI + TCP/IP
Cyber Security
Networking
NMCI
100

What is the 7th layer of the OSI model? 

Application

100

What does DDoS stand for? 

Distributed Denial of Service

100


What is this topology?

Ring topology

100

What is the correct certificate you login with? 

EDIPI/CAC ID without the extra numbers.

200

What does SMTP stand for? 

Simple Mail Transfer Protocol

200

What is it called when a source is trying to hide its identity. (ex. IP address, ARP)

Spoofing

200

What is the purpose of a router? 

To connect multiple networks.

200

How do you check your TLS settings? 

Internet options, Advanced tab, scroll down and check that TLS 1.0, 2.0, and 3.0 are checked. 

300

How many layers does TCP/IP have and what are they? 

4 layers:

Application, Transport, Internet, Network Interface 

300

What does VPN stand for and what is it used for? 

Virtual Private network, 

It is used to create a safe and encrypted connection.

300

What does DNS stand for and what is it used for? 

Domain Name Server, 


It is used to associate an IP address to their host names. 

(ex. 8.8.8.8 is google) 

300

How often do you need to log into your SIPR before it gets disabled/deleted? 

EVERY 30 DAYS

400

What does NAT stand for and what is this protocol used for?

Network Address Translation, provides a way for multiple computers on the same network to share a single connection to the internet.

400

What are 3 ways you can prevent brute force attacks? 

Password length, password complexity, and limited login attempts. 

400

What is the difference between internet, intranet, and extranet? 

Internet: applications are accessed by anyone from any location using the web. 

Intranet: Limited access to users in the same organization

Extranet: external users are allowed or provided with access to use the network application of the organization 

400

What do you need to submit for an account? 

A completely filled out SAAR-N. 

500

What is a subnet mask and how many bits are required to create one?  

It is an octet combined with an IP in order to identify the network address and host address. A subnet mask is made up of 32 bits.

500

What is the similarity and difference between encryption and hashing?

Both convert data into an unreadable format. 

Encryption: data can be converted back to original form. 

Hashing: data cannot be converted back

500

What is the purpose of data encapsulation? 

To enable data transmission from one computer to another. 

It basically takes data from one protocol and translates it into another protocol so that the data can continue to move across the network.

500

When all else fails, what do you do?

CALL NMCI

(1-866-843-6624)

M
e
n
u