Layers
Devices and Uses
Cyber Attacks
Ports and Protocols
Cyber Security
100

This layer of the OSI or TCP/IP model transmits data via protocols like TCP or UDP.

What is the Transport Layer?

100

This layer 1 device connects multiple devices on a network.  It receives data on one port and broadcasts it to all other ports.  

What is a Hub?

100

This is malware disguised as a legitimate program to trick users into downloading and executing.

What is Trojan?

100

This protocol uses Port 25 or 587 and sends mail.

What is SMTP (Simple Mail Transfer Protocol)?

100

These are the 5 pillars of cybersecurity.

What is Confidentiality, Integrity, Availability, Non-Repudiation, and Authenticity?

200

This layer of the OSI or TCP/IP model physically transmits data over a network.

What is the Network layer?

200

This layer 1 device received, regenerates, and retransmits raw signals to extend networks physical range. 

What is a Repeater?

200

These malwares are similar but ___ is self-replicating that spreads without human intervention and ___ relies on a user to run the infected program to spread. 

What is worm and virus?

200

This port uses port 110 or 995 and receives mail.

What is POP 3(Post Office Protocol v3)?

200

This issues maintains PKCs.

What is PKI (Public Key Infrastructure)?

300

These 3 layers of the OSI model are combined to make the application layer of the TCP/IP model

What is layer 5 (session), 6 (presentation), and 7 (application)?

300

This layer 6 device acts as a gateway between a user and the internet and adds security. 

What is a Proxy Server?

300

This attack cracks passwords by systematically entering every word in a given word list.

What is Dictionary Attack?

300

This port uses port 20 to transfer and port 21 to control.

What is FTP (File Transfer Protocol)?

300

This provides digital signatures and encryption capabilities. 

What is PKC (Public Key Certificates)?

400

The ____ Model is a theoretical framework for design, while the ____ Model defines actual protocols in use. 

What is TCP/IP and OSI?

400

This layer 3 device connects multiple networks and forwards data packets to destination. It is essential for using the internet.

What is a Router?

400

Attackers may use this in conjunction with a cyber attack to gain unauthorized higher level permissions.

What is Privilege Escalation?

400

This protocol uses port 80 or 443 to send information from websites

What is HTTP/S (HyperText Transfer Protocol/Secure)?

400

A digital signature is an example of this cyber-security pillar. 

What is non-repudiation?

500

These are the 3 layers of routing.

What is the Access layer, the Distribution layer, and the Core layer?

500

This device operates on layers 3, 4, and 7.  It is set up to permit or deny traffic and is used to add security. 

What is a Firewall?

500

Attackers may use this in conjunction with other attacks to gain persistence on a system.

What is Backdoor?

500

These two protocols all connections between networks.  ____ is encrypted and uses port 22. _____ is in plain text and uses port 23.

What is SSH (secure Shell) and Telnet?

500

Version control is an example of this pillar.

What is integrity?