Cables
Topology
Email Protocols
Attacks
AAA Triad
100

This type of cable allows data to travel via light.

What is Fiber Optics?

100

All nodes connect to a central device (switch/hub). It is reliable and easy to troubleshoot, though the central node is a single point of failure.

What is Star Topology?

100

Sets of rules for sending and receiving electronic messages.

What is email protocols?

100

This attack pretends to be a legitimate company or person to get information.

What is Phishing?

100

In cybersecurity this acronym stands for Authentication, Authorization, and Accounting.

What is AAA Triad?

200

This type of cable detects and adjusts cable types.

What is Auto-MDIX?

200

Nodes are interconnected, with full mesh providing high redundancy and reliability, often used for critical infrastructure.

What is Mesh Topology?

200

The standard TCP/IP protocol used for sending and relaying email messages across the internet.

What is SMTP (Simple Mail Transfer Protocol)?

200

This overload targets to make it inaccessaible.

What is DoS (Denial of Service)?

200

Verifies the user’s identity through credentials like passwords, multi-factor authentication (MFA), or biometrics.

What is authentication?

300

This type of cable connects different devices.

What is a straight through cable?

300

All nodes share a single central cable, which is cost-effective for small networks but fails if the main cable breaks.

What is Bus Topology?

300

A standard application-layer Internet protocol used by email clients to download emails from a remote server to a local device, typically deleting the server copy afterward.

What is pop 3 email Protocol?

300

This attack disguises its identity into trusted individual to get information about a person.

What is spoofing?

300

Determines what resources or actions an authenticated user is permitted to access, often using Role-Based Access Control (RBAC).

What is Authorization?

400

This type of cable connects same devices.

What is a crossover cable?

400

Each node connects to two others, forming a path. Data travels in one direction, making it less common today.

What is Ring Topology?

400

Generally used for server-to-server relay; often blocked for client submission to prevent spam.

What is port 25?

400

This attack intercepts data between communicators.

What is Man-in-the-middle?

400

Tracks and logs user activities, including login times and accessed resources, crucial for auditing and forensics.

What is Accounting?

500

A popular copper networking cable featuring pairs of insulated wires twisted together to reduce crosstalk and electromagnetic interference (EMI).

What is UTP (Unshielded Twisted Pair)?

500

Defines the physical or logical arrangement of devices (nodes) and connections (links) in a network, determining how data flows.

What is network Topology?

500

Secure connections (SSL/TLS) are highly recommended over unencrypted ones.

What are ports 25, 143 and 110?

500

Malicious attempts to gain unauthorized access to, disrupt, or steal data from an organization’s network.

What are network attacks?

500

A framework used to control network access, enforce policies, and monitor user activity. It enhances security by verifying identity, granting specific permissions based on roles, and logging actions for auditing.

What is The AAA triad in cybersecurity?