Match firewalls, VLAN, DNS poisoning, TLS handshake, ARP spoofing, NAT, and SDN to their descriptions.
Drag & Match 🧠Match security models to their core concept and key limitation, including Castle-and-Moat, Hub-and-Spoke, VPN-Only, and Zero Trust.
Model Mapping 🛰️Drag protocol numbers onto the correct descriptions for AH (51), ESP (50), TCP (6), and ICMP (1).
Drag & Drop 📘Match protocol numbers to AH, ESP, TCP, and ICMP descriptions in a simplified classic layout.
Drag & DropMatch real-world scenarios to the correct firewall: Application, Stateful, Packet-Filtering, Circuit-Level, or Stateless. Decode the keywords.
Drag & Match 🌐Match Dual Stack, Tunneling, and NAT-PT to definitions. Know what helps vs. what doesn't (IPSec ≠ coexistence).
Drag & Match