What device connects multiple network segments and directs traffic between them?
Router
What type of cable is most commonly used for modern Ethernet networks?
Cat5e or Cat6
What protocol is responsible for automatically assigning IP addresses?
DHCP
What type of device do we use to route traffic between VLANs?
Layer 3 Switch or Router
What security principle means giving users only the access they absolutely need?
Principle of Least Privilege
What model has seven layers and is used to understand how data moves through a network?
OSI Model
What does the "U" in UTP cable stand for?
Unshielded
What does TCP/IP stand for?
Transmission Control Protocol / Internet Protocol
What is the main reason to segment a network?
Better performance and security
What type of access control uses badges, fobs, or keycards?
Physical Access Control
What do we call a network that is limited to one physical location like a building or campus?
LAN
Which wireless frequency is better for range and wall penetration?
2.4 GHz
What is the IP address used for loopback testing?
127.0.0.1
What does DMZ stand for and what’s its role?
DAILY DOUBLE!!!
Demilitarized Zone; it isolates public-facing services from internal networks
What’s the difference between authentication and authorization?
Authentication = who you are; Authorization = what you're allowed to do
What is the difference between a switch and a hub in terms of how they send data?
A switch sends data to specific devices, a hub broadcasts to all.
What kind of connector is commonly used with fiber optic cables?
LC or SC
What network topology connects each device in a closed loop?
Ring Topology
What does MFA stand for, and what is its benefit?
Multi-Factor Authentication; adds an extra layer of security
What does MTU stand for and why is it significant in networking?
Maximum Transmission Unit; it determines packet size for transmission.
What term describes the loss of signal strength as it travels over a cable?
Attenuation
What’s the key difference between public and private IP addresses?
Public IPs are internet-routable; private IPs are not.
What is the main advantage of a mesh network?
Redundancy and fault tolerance
What’s the difference between a risk and a vulnerability?
DAILY DOUBLE!!!
Risk = potential harm; Vulnerability = a weakness that can be exploited