Address & ID
Hardware & Logic
Attack Surface
Secure Logic
The Final Review
100

The physical "Fingerprint" of a network card that never changes.

What is a MAC Address?

100

Used to connect different networks (subnets) together.

What is a Router?

100

The strategy where we assume every connection is a threat and "never trust, always verify.

What is Zero Trust?

100

The modern protocol that protects traffic in transit.

What is TLS?

100

The black box where professionals type commands instead of using a mouse.

What is the CLI? (Command Line Interface)

200

Who automatically assigns IP addresses to devices.

What is DHCP?

200

The "Invisible Walls" that organize a switch logically without extra hardware.

What is a VLAN?

200

An attack where the hacker "Poisons" a table to link their MAC to the Gateway

What is ARP Spoofing?

200

A list used by a firewall to Inspect, Compare, and Act

What is an ACL? (Access Control List)

200

This specific port number is used for Secure Web Traffic.

What is Port 443 / HTTPS?

300

This "Internet Phonebook" translates domain names like google.com into IPs

What is DNS?

300

Allows multiple private devices to share one public IP.

What is NAT?

300

The "Silent Observer" sitting between two parties to steal or alter data.

What is Man-in-the-Middle?

300

This model uses 4 practical layers to explain how the internet actually functions

What is the TCP/IP Model?

300

The Layer of the OSI model where Cables, Hubs, and Bits live.

What is the Physical Layer / Layer 1?

400

What is this address?
2001:0:3238:DFE1:63::FEFB 

What is IPv6?

400

The wireless network that lets your phone or laptop connect to the internet without cables

What is Wi-Fi?

400

Changing "Phonebook" entries to redirect users to a fraudulent website

What is DNS Poisoning?

400

This legacy protocol is the unsecure version of Port 443.  

What is HTTP / Port 80?

400

The primary goal of a DMZ is to prevent an attacker from moving from the internet to this.

What is the Internal / Private Network?

500

The 32-bit number that defines which part of an IP belongs to the network vs. the host.

What is a Subnet Mask?

500

A device that works at Layer 2 and uses MAC addresses to forward data to specific ports.

What is a Switch?

500

In Zero Trust, this principle means giving users only the minimum access they need to do their job.

What is Least Privilege?

500

The process of locking data so only authorized people can access it.

What is Encryption?

500

A secure, encrypted "Tunnel" that allows remote users to join a private network safely.

What is a VPN? What is a VPN?