What is the 7th layer of the OSI model?
Application
What does DDoS stand for?
Distributed Denial of Service

What is this topology?
Ring topology
What is the correct certificate you login with?
EDIPI/CAC ID without the extra numbers.
What does SMTP stand for?
Simple Mail Transfer Protocol
What is it called when a source is trying to hide its identity. (ex. IP address, ARP)
Spoofing
What is the purpose of a router?
To connect multiple networks.
How do you check your TLS settings?
Internet options, Advanced tab, scroll down and check that TLS 1.0, 2.0, and 3.0 are checked.
How many layers does TCP/IP have and what are they?
4 layers:
Application, Transport, Internet, Network Interface
What does VPN stand for and what is it used for?
Virtual Private network,
It is used to create a safe and encrypted connection.
What does DNS stand for and what is it used for?
Domain Name Server,
It is used to associate an IP address to their host names.
(ex. 8.8.8.8 is google)
How often do you need to log into your SIPR before it gets disabled/deleted?
EVERY 30 DAYS
What does NAT stand for and what is this protocol used for?
Network Address Translation, provides a way for multiple computers on the same network to share a single connection to the internet.
What are 3 ways you can prevent brute force attacks?
Password length, password complexity, and limited login attempts.
What is the difference between internet, intranet, and extranet?
Internet: applications are accessed by anyone from any location using the web.
Intranet: Limited access to users in the same organization
Extranet: external users are allowed or provided with access to use the network application of the organization
What do you need to submit for an account?
A completely filled out SAAR-N.
What is a subnet mask and how many bits are required to create one?
It is an octet combined with an IP in order to identify the network address and host address. A subnet mask is made up of 32 bits.
What is the similarity and difference between encryption and hashing?
Both convert data into an unreadable format.
Encryption: data can be converted back to original form.
Hashing: data cannot be converted back
What is the purpose of data encapsulation?
To enable data transmission from one computer to another.
It basically takes data from one protocol and translates it into another protocol so that the data can continue to move across the network.
When all else fails, what do you do?
(1-866-843-6624)