This type of cable allows data to travel via light.
What is Fiber Optics?
All nodes connect to a central device (switch/hub). It is reliable and easy to troubleshoot, though the central node is a single point of failure.
What is Star Topology?
Sets of rules for sending and receiving electronic messages.
What is email protocols?
This attack pretends to be a legitimate company or person to get information.
What is Phishing?
In cybersecurity this acronym stands for Authentication, Authorization, and Accounting.
What is AAA Triad?
This type of cable detects and adjusts cable types.
What is Auto-MDIX?
Nodes are interconnected, with full mesh providing high redundancy and reliability, often used for critical infrastructure.
What is Mesh Topology?
The standard TCP/IP protocol used for sending and relaying email messages across the internet.
What is SMTP (Simple Mail Transfer Protocol)?
This overload targets to make it inaccessaible.
What is DoS (Denial of Service)?
Verifies the user’s identity through credentials like passwords, multi-factor authentication (MFA), or biometrics.
What is authentication?
This type of cable connects different devices.
What is a straight through cable?
All nodes share a single central cable, which is cost-effective for small networks but fails if the main cable breaks.
What is Bus Topology?
A standard application-layer Internet protocol used by email clients to download emails from a remote server to a local device, typically deleting the server copy afterward.
What is pop 3 email Protocol?
This attack disguises its identity into trusted individual to get information about a person.
What is spoofing?
Determines what resources or actions an authenticated user is permitted to access, often using Role-Based Access Control (RBAC).
What is Authorization?
This type of cable connects same devices.
What is a crossover cable?
Each node connects to two others, forming a path. Data travels in one direction, making it less common today.
What is Ring Topology?
Generally used for server-to-server relay; often blocked for client submission to prevent spam.
What is port 25?
This attack intercepts data between communicators.
What is Man-in-the-middle?
Tracks and logs user activities, including login times and accessed resources, crucial for auditing and forensics.
What is Accounting?
A popular copper networking cable featuring pairs of insulated wires twisted together to reduce crosstalk and electromagnetic interference (EMI).
What is UTP (Unshielded Twisted Pair)?
Defines the physical or logical arrangement of devices (nodes) and connections (links) in a network, determining how data flows.
What is network Topology?
Secure connections (SSL/TLS) are highly recommended over unencrypted ones.
What are ports 25, 143 and 110?
Malicious attempts to gain unauthorized access to, disrupt, or steal data from an organization’s network.
What are network attacks?
A framework used to control network access, enforce policies, and monitor user activity. It enhances security by verifying identity, granting specific permissions based on roles, and logging actions for auditing.
What is The AAA triad in cybersecurity?