Defense & Access
Attacks & Threats
Monitoring & Analysis
Firewalls & ACLs
VLANs & Network Design
100

This strategy uses multiple layers of protection in a network.

What is Defense in Depth?

100

A fake email designed to steal login information.

What is phishing?

100

A system that detects threats but does not block them.

What is an IDS?

100

A device that filters network traffic based on rules.

What is a firewall?

100

Logical separation of networks on the same hardware.

What is VLAN?

200

The process of verifying who a user is.

What is authentication?

200

Software designed to damage or disrupt systems.

What is malware?

200

A system that detects and blocks malicious traffic.

What is an IPS?

200

A network segment for public-facing servers.

What is a DMZ?

200

VLANs improve this by separating users into groups.

What is security?

300

This determines what resources a user can access

What is authorization?

300

This attack floods a network with traffic to overwhelm it.

What is a DDoS attack?

300

Records of system and network activity.

What are logs?

300

Rules used to allow or deny network traffic.

What are ACLs?

300

This allows multiple VLANs to travel across one link.

What is trunking?

400

This principle gives users only the permissions they need.

What is least privilege?

400

A weakness in a system that attackers can exploit.

What is a vulnerability?

400

A system that collects and analyzes logs from multiple sources.

What is a SIEM?

400

ACL rules are processed in this order.

What is top-down?

400

Limits which devices can connect to a switch port.

What is port security?

500

Name one layer of defense in depth besides network security.

What is physical / host / application / data security?

500

An employee reuses passwords across systems, creating risk.

What is a security vulnerability?

500

The process of scanning a network to identify connected devices.

What is network discovery?

500

If “deny all” is the first rule, this happens.

What is all traffic is blocked?

500

Separating students and staff into different networks uses this concept.

What are VLANs?

M
e
n
u