Layers 1 & 2
Layers 3 & 4
Security
Computer Science
OurStory
100

It carries light from one end to the other, often used for communications.

What is optical fiber?
100

This is the number of bits in an IPv6 address.

What is 128?

100
A type of cyberattack that involves sending fraudulent communications (like e-mail) to trick people into revealing sensitive information.

What is Phishing?

100

This popular operating system, launched in 1991, has its own mascot, Tux the Penguin.

What is Linux?

100

The year that Dell was founded.

What is 1984?

200

This protocol prevents loops in Ethernet networks.

What is Spanning Tree Protocol?

200

Switching gears, this transport-layer protocol (full name) provides reliable, ordered, and error-checked delivery of byte streams.

What is the Transmission Control Protocol (TCP)?

200

Not just for roadside assistance, this framework (full name, no abbrev.) controls user access, enforces access policies, and audits usage. 

What is Authentication, Authorization, and Accounting (AAA)?

200

This company, which provides hosting for software development and distributed version control, is known for its iconic Octocat mascot.

What is GitHub?

200

The year in which Dell acquired Force10 Networks

What is 2011?

300

These are two types of 100GbE transceiver form-factors used in Dell PowerSwitch (shameless plug!).

What are QSFP28 and SFP56-DD?
(CFP also acceptable)

300

This networking protocol (full name, no abbrev.) exchanges reachability information between various autonomous systems.

What is Border Gateway Protocol?

300

A way to restrict access to authorized users, defined around their job category or organizational function(s). 

What is Role-Based Access Control (RBAC)?

300

This is commonly abbreviated as BIOS.

What is Basic Input and Output System?

300
The initial codename of the Enterprise SONiC project.

What is Project Arlo?

400

Precisely speaking, this technology is used to synchronize clocks between devices on a network, on the order of nanoseconds.

What is the Precision Time Protocol (PTP)?

400

This technology enables multiple routing tables on a single device.

What is Virtual Routing and Forwarding (VRF)?

400

In Public Key Infrastructure, this entity issues and verifies certificates.

What is a Certificate Authority (CA)?

400

Unicode, the standard for character encoding multilingual text as binary, is the successor to this US encoding standard.

What is ASCII?

400

The open-source SONiC community is managed by this non-profit organization.

What is The Linux Foundation?

500

No mistake, this technology is used to improve the reliability of data transmission over noisy communication channels.

What is Forward Error Correction (FEC)?

500

This networking technology (full name, no abbrev.) enables L2 traffic to be shared over wide area networks.

What is Ethernet Virtual Private Network (EVPN)?

500
A key factor in building secure systems, this is the measure of randomness and unpredictability of a system.

What is Entropy?

500

In C, this keyword is a type qualifier that tells the compiler that the value of the variable can change at any time, without any action being taken by the code that the compiler can see (e.g., an interrupt).

What is `volatile`?

500

Our first (pilot) Enterprise SONiC customer.

Who is Comcast/XFinity?