Social engineering
CLI commands
Network topology
Network devices
Addressing
100
What is social engineering?

The process of taking advantage of the trust of other in order to gain information.

100

What command is used to encrypt a password?

serv pass

100

Which topology has devices that connect to a single point.

Star topology

100

A device that connects devices on a local network 

What is a switch

100

How many bits make up an IPV4 address?

What is 32 bits?

200

What is smishing?

Smishing is a type of phishing attack that uses text messages to trick people into sharing personal information.

200

What is a command used to configure a port?

int g0/0/0 or int fa0/1

200

What is a topology where devices devices are connected in a loop?

Ring topology

200

What is a bridge used for?

to connect hosts or network segments together
200

A configuration made for both ipv4 and ipv6 addresses

What is Dual Shock?

300

What is pharming?

Pharming ("Pharming + "phishing") is a kind of social engineering cyberattack in which criminals redirect internet users trying to reach a specific website to a different, fake site.

300

How do you configure router rip?

#router rip -> #network [ip address]

300

What is a topology with optimal routing and is always available because every other node connects to every other node?

Full mesh topology

300

A network device that is similar to a router, only it has its own built-in antenna, transmitter and adapter

What is a access point

300

An advantage to using ipv6

More addresses on networks and for hosts
400

What is vishing?

Vishing is short for "voice phishing", which involves defrauding people over the phone, enticing them to divulge sensitive information.

400
How do you configure a router to act as a dhcp server?

#ip dhcp pool [name] -> #network [net address] [subnet mask] -> #default-router [default gateway]

400

What is an interconnection of different types of nodes, devices, or radios.

Wireless mesh topology

400

This is a hardware component that enables a device to connect to an ethernet network

What is a NIC

400

AN ipv6 (::) represents what in the address?

What is a continuous string of zeros

500

What is spear phishing?

Spear-phishing is a type of phishing attack that targets specific individuals or organizations typically through malicious emails.

500

How do you create and name a vlan

#vlan [vlan number] -> name [vlan name]

500

This topology uses a single cable where each device taps into by using either a vampire rap or a T-connector.

Bus topology

500

A group of devices sharing resources located on or provided by network nodes?

What is a computer network

500

A type of technology that enables devices in IPV6 only networks

What is NAT64