Networking Basics
Protocols & Ports
Security Fundamentals
Threats & Attacks
Defense & Prevention
100

This device connects multiple devices on a network and operates at Layer 2 of the OSI model.

What is a switch?

100

Port 80 is used for this protocol.

What is HTTP?

100

This is the concept of ensuring only authorized users can access information.

What is confidentiality?

100

This tactic relies on human interaction and often involves tricking people into breaking security protocols to obtain access to, or compromise information and systems.

What is social engineering?

100

This is a device or software that monitors and controls incoming and outgoing network traffic.

What is a firewall?

200

The OSI model has this many layers.

What is seven?

200

* * * DOUBLE JEOPARDY * * * 

This protocol securely transfers files and operates on port 22. 

What is SFTP or SCP?

200

This is the process of converting data into a secret code to protect it from unauthorized access.

What is encryption?

200
An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.
What is phishing?
200

This term refers to keeping systems updated to fix vulnerabilities.

What is patching?

300

This type of IP address is automatically assigned and begins with 169.254.

What is an APIPA (Automatically Provisioned IP Address)?

300

This connectionless protocol is used for simple message transmission and operates at the Transport Layer.

What is UDP?

300

*** DOUBLE JEOPARDY*** 

These three principles make up the CIA triad. 

What are confidentiality, integrity, and availability?

300
* * * DOUBLE JEOPARY!!! * * * Linked In or Facebook are channels that are often used for this targeted attack on specific individuals, or organizations which seeks unauthorized access to confidential data.
What is spear phishing?
300

If you are leaving your computer unattended you must Ctrl-Alt-Delete + Enter to lock your screen, but this is another, shorter key sequence to do the same thing.

What is Windows button + L key sequence?

400

This protocol is used to assign IP addresses dynamically.

What is DHCP?

400

This protocol translates domain names into IP addresses.

What is DNS?

400

his type of attack attempts to make a network resource unavailable to its intended users.

What is a Denial of Service (DoS) attack?

400
A technique used to retrieve information from a garbage bin and/or trash can, that could be used to carry out an attack against an organization.
What is dumpster diving?
400
Performing this action after opening an email from an unknown source could compromise your computer.
What is clicking on a link / opening an attachment?
500

This routing protocol uses administrative distance and metrics like hop count to determine best paths.

What is RIP?

500

This port is used for secure web traffic over HTTPS.

What is port 443?

500

This term describes verifying the identity of a user, device, or process.

What is authentication?

500

An attacker gains access to a network by pretending to be an authorized device. This is known as this type of attack.

What is spoofing?

500

A secure network architecture places public-facing services in this type of network zone.

What is a DMZ (demilitarized zone)?