CNET 105
CNET 107
Random
Cybersecurity
100
True / False = Windows domain controllers control accounts, users, logins and other computer settings
True
100

A ___ is prevented by STP and is a result of redundant links.

Loop

100

Which country has more pyramids than any other country in the world

Sudan

100

___________ is known as manipulating and deceiving others for your own gain

Social engineering

200

You can see all your networking services using this Linux command

Systemctl or netstat 

200

T/F - We can bundle two redundant cables into 1 logical link

True

200

What is the only planet in our solar system that rotates clockwise?

Venus

200
How many cyber-attacks occur each second?

39

300

What are three reasons that would prevent someone from accessing the internet?

1. No default gateway set

2. They didn't pay their ISP internet bill

3. Firewall blocking internet access

300

We know that more cables are better in networking. Why would we want to turn multiple physical cables into 1 logical cable?

Speed, redundancy, security, and efficiency 

300

What is the only continent on Earth where you cannot find any bees?

Antarctica. It's too cold!

300

What is a botnet?

A network of infected devices "bots"

400

How could you quickly find the IP address of  https://exploringanimals.com/

400

What is a trunk port in networking? What is one item you should never put in the trunk of your car?

A port that connects one switch to another switch in a network that uses VLANS. Eggs & milk from the grocery store!

400

Which animal is the only mammal capable of true, powered flight?

The bat

400

The average pay for someone working in information technology / cybersecurity is _________

124k

500
What is the command to trace how many "hops" or routers your packet goes through until it reaches the destination
500
What is the equivalent to 255.255.255.0 in slash notation? 

/24 because 255.255.255.0 is really just 11111111.11111111.11111111.0 in binary (128 64 32 16 8 4 2 1)

500

What is the most common color for toilet paper in France?

Pink!

500

You got hacked. You want to map out what methods and techniques the hacker used so it doesn't happen again. What is the framework we used in class that would be very helpful for this. 

MITRE Attack