This device connects multiple devices on a network and operates at Layer 2 of the OSI model.
What is a switch?
Port 80 is used for this protocol.
What is HTTP?
This is the concept of ensuring only authorized users can access information.
What is confidentiality?
This tactic relies on human interaction and often involves tricking people into breaking security protocols to obtain access to, or compromise information and systems.
What is social engineering?
This is a device or software that monitors and controls incoming and outgoing network traffic.
What is a firewall?
The OSI model has this many layers.
What is seven?
* * * DOUBLE JEOPARDY * * *
This protocol securely transfers files and operates on port 22.
What is SFTP or SCP?
This is the process of converting data into a secret code to protect it from unauthorized access.
What is encryption?
This term refers to keeping systems updated to fix vulnerabilities.
What is patching?
This type of IP address is automatically assigned and begins with 169.254.
What is an APIPA (Automatically Provisioned IP Address)?
This connectionless protocol is used for simple message transmission and operates at the Transport Layer.
What is UDP?
*** DOUBLE JEOPARDY***
These three principles make up the CIA triad.
What are confidentiality, integrity, and availability?
If you are leaving your computer unattended you must Ctrl-Alt-Delete + Enter to lock your screen, but this is another, shorter key sequence to do the same thing.
What is Windows button + L key sequence?
This protocol is used to assign IP addresses dynamically.
What is DHCP?
This protocol translates domain names into IP addresses.
What is DNS?
his type of attack attempts to make a network resource unavailable to its intended users.
What is a Denial of Service (DoS) attack?
This routing protocol uses administrative distance and metrics like hop count to determine best paths.
What is RIP?
This port is used for secure web traffic over HTTPS.
What is port 443?
This term describes verifying the identity of a user, device, or process.
What is authentication?
An attacker gains access to a network by pretending to be an authorized device. This is known as this type of attack.
What is spoofing?
A secure network architecture places public-facing services in this type of network zone.
What is a DMZ (demilitarized zone)?