A ___ is prevented by STP and is a result of redundant links.
Loop
Which country has more pyramids than any other country in the world
Sudan
___________ is known as manipulating and deceiving others for your own gain
Social engineering
You can see all your networking services using this Linux command
Systemctl or netstat
T/F - We can bundle two redundant cables into 1 logical link
True
What is the only planet in our solar system that rotates clockwise?
Venus
39
What are three reasons that would prevent someone from accessing the internet?
1. No default gateway set
2. They didn't pay their ISP internet bill
3. Firewall blocking internet access
We know that more cables are better in networking. Why would we want to turn multiple physical cables into 1 logical cable?
Speed, redundancy, security, and efficiency
What is the only continent on Earth where you cannot find any bees?
Antarctica. It's too cold!
What is a botnet?
A network of infected devices "bots"
How could you quickly find the IP address of https://exploringanimals.com/
What is a trunk port in networking? What is one item you should never put in the trunk of your car?
A port that connects one switch to another switch in a network that uses VLANS. Eggs & milk from the grocery store!
Which animal is the only mammal capable of true, powered flight?
The bat
The average pay for someone working in information technology / cybersecurity is _________
124k
/24 because 255.255.255.0 is really just 11111111.11111111.11111111.0 in binary (128 64 32 16 8 4 2 1)
What is the most common color for toilet paper in France?
Pink!
You got hacked. You want to map out what methods and techniques the hacker used so it doesn't happen again. What is the framework we used in class that would be very helpful for this.
MITRE Attack