Cables
Addressing
Protocols
Conversions
Security
100

This is the most common type of cabling used in networks today.

What is copper cabling?

100

FF-FF-FF-FF-FF MAC Address Represents this

What is Broadcast MAC Address

100

This is what IGP stands for

interior gateway protocol or Interior routing protocol

100

44 in binary

00101100

100

This is the number of security customers that Cisco has.

300,000

200

This is the type of connector that UTP cables are terminated with.

What are RJ-45 connectors?

200

OUI stands for this.

What is an Organizationally Unique Identifier?

200

This is the standard communication protocol used for the transfer of computer files from a server to a client on a computer network 

What is FTP?

200

44 in hexadecimal

2C

200

This threat involves software being used to gain unauthorized access to a computer system.

What is malware?

300

This is the cable that attached antennas to wireless devices.

what are coaxial cables?

300

An IPv6's MAC Address Length is this

What is 128 bits?

300

What is the difference between TCP and UDP?

TCP is a connection-based protocol and UDP is connectionless

300

120 in hexadecimal and binary

78 hex, 01111000 binary

300

What is the difference between and IPS and a firewall?

an IPS detects and notifies a system admin of an attack (depending on configuration), while a firewall performs actions such as blocking and filtering traffic.

400

These are the 4 key features of a STP cable.

What is the outer jacket, braided or foil shield, foil shield, and twisted pairs?

400

An IPv4 Subnet Mask is used to do this

What is to differentiate the network portion of the address from the host portion

400

This address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment 

What is a MAC address?

400

149.19.41.154 in binary

10010101.00010011.00101001.10011010

400

These are two core functionalities of DNS layer security.

Live threat intelligence, proxy & file inspection

500

This type of cable counters EMI and RFI by using shielding techniques and special connectors.

What is a STP cable?

500

MAC Address is often referred to a Burned-In-Address (BIA) because the address is hardcoded into this

What is read-only memory on the NIC?

500

This is a network protocol used to automate the
process of configuring devices on IP networks 

What is DHCP?

500

AC-D9-50-A5-FF-69 in decimal

172-217-80-165-255-105

500

This is the flaw that an attacker leverages when exploiting SQL injection vulnerabilities.

What is user input validation in a web page on web applications.