Social Engineering
CLI Commands
Network Topology
Network Devices
Addresses
100

what is social engineering?

The process of taking advantage of the trust of others in order to gain information.

100

What command is used to encrypt a password?

serv pass

100

Which topology has devices that connect to a single point.

Star topology

100

a device that connects devices on a local network.

What is a switch

100

How many bits make up an IPV4 IP address?

What is 32 bits?

200

what is smishing?

Smishing is a type of phishing attack that uses text messages to trick people into sharing personal information.

200

What is a command used to configure a port?

int g0/0/0 or int fa0/1

200

What is a topology where devices are connected in a loop?

Ring topology

200

a network device that is similar to a router, only it has its own built-in antenna, transmitter and adapter.

What is a access point

300

What is pharming?

Pharming (“farming” + “phishing”) is a kind of social engineering cyberattack in which criminals redirect internet users trying to reach a specific website to a different, fake site.

300

How do you configure router rip?

        #router rip -> #network [ip address]

300

What is a Topology with optimal routing and is always available because every node connects to every other node?

Full mesh topology

300

What is a bridge used for

to connect hosts or network segments together.

400

What is vishing?

Vishing is short for "voice phishing," which involves defrauding people over the phone, enticing them to divulge sensitive information.

400

 how do you configure a router to act as a dhcp server?

#ip dhcp pool [name] -> #network [net address] [subnet mask] -> #default-router [default gateway]

400

What is an interconnection of different types of nodes, devices, or radios.

Wireless mesh topology

400

This is a hardware component that enables a device to connect to an Ethernet network.

What is a NIC

500

What is spear phishing

Spear-phishing is a type of phishing attack that targets specific individuals or organizations typically through malicious emails.

500

How do you create and name a vlan?

    #Vlan [vlan number] -> name [vlan name]

500

This topology uses a single cable where each device taps into by using either a vampire tap or a T- connector.

Bus topology

500

A group of devices sharing resources located on or provided by network nodes

What is a computer network