Ports and Services
Cloud
Wireless
Application security and vulnerabilities
Network Appliances
100

DNS is associated with this 

What is servers?

100

The four type of cloud services

What is Iaas, Paas, Saas, Xaas?

100

Definition of Evil Twin 

What is pretend to be a legitimate network?

100

Steps to securing an application 

What is data minimization, salting, hashing, and data tokenization?

100

Definition of proxy server 

What is to accept and forward requests?

200

The secure protocol of HTTP 

What is HTTPS?

200

Virtualized servers do this

What is act like real servers?

200

Types of Wireless connectivities 

What is wi-fi, NFC and RFID, and Infrared?

200

Definition of SQL injection 

What is the attacker is able to provide input to the web application und then monitor the outputs?

200

Difference between IDS and IPS

What is IDS detects threats and IPS blocks threats?

300

The secure protocol that uses SSH

What is SFTP?

300

Difference between Type 1 and Type 2 Hypervisor 

What is Type 1 hypervisor is directly connected to hardware and the Type 2 hypervisor is not?

300

Jamming attacks cause this

What is Denial of Service?

300

Ways to exploit trust and execute code 

What is request forgery and server side request forgery?

300

Used to prevent low availability on the network 

What is Load balancer?

400

Original port for Telnet

What is TCP 23?

400

Cloud service providers 

What is GCP, AWS, and Azure?

400

Steps to secure the network 

What is identifying wireless networks and access points and signals strengths, cryptographic and authentication protocols, aps must be configured to log and report on the report, and use both deployment methods and admin tools?

400

An application allows reflected input.

What is reflected cross-site scripting 

400

The more secure and reliable firewall. 

What is stateful firewalls?

500

RTP original port

What is VDP 16384-32767?

500

IoT definition

What is any physical device that can connect to the internet?

500

Difference between blue jacking and blue snarfing 

What is blue jacking is sending unsolicited messages to bluetooth devices and blue snarfing is stealing contacts and other data?

500

Ways that credential stealing attacks can happen 

What is social engineering, malware, automated attacks, and application vulnerabilities?

500

Purpose of content filters 

What is to block traffic based on content rules?