technology allows a user to log in once and gain access to multiple different systems without being prompted for a password again
SSO
What is the primary difference between Phishing and Whaling?
CEOs, CFOs
This Ethernet cable has a maximum bandwidth of 10 Gbps (or 10000 Mbps)
Cat 6
This network topology has a device like a router or a hub at the center. Main advantage is low cost and flexibility. Disadvantage is the reliance on the router, if it fails, communication among computers on the network is disrupted.
Star
What can you upgrade in your laptop to make programs run smoother and handle more tasks at one time?
RAM
type of malware is a collection of "zombie" computers controlled by a central server
Botnet
An attacker spends weeks researching a specific HR manager, learning the names of their children and their recent vacation destination. They then send a highly personalized email about a "school emergency." This is an example of:
Spear Phishing
The maximum amount of data that a network medium can theoretically transfer.
Bandwidth
This network topology is simple and flexible because nodes can just be added to the line. A disadvantage is that more users = slower connections, also if there is a short or break in the line, nodes after the failure lose service.
Bus
Which resolution is Full HD?
1920 x 1080
Windows feature should be disabled to prevent a malicious USB (such as a Rubber Ducky) from running a script the moment it is plugged in
AutoRun
You receive a phone call from "Microsoft Support" claiming your PC is sending out viruses. They ask for remote access to "fix" it. Since you didn't call them, what should you do?
Hang up and call the official support number from the company's website.
The IEEE standard for Wireless (Wi-Fi)
802.11
Any computer or electronic device connected to a network.
node
This type of component can be easily and quickly replaced by the user or technician without having to send the whole system back to the manufacturer for repair.
Field Replaceable Unit
security principle ensures that a user is provided with only the minimum permissions necessary to perform their specific job
Principle of Least Privilege
An email states: "Your payroll account has been suspended. You have 2 hours to verify your identity or your next paycheck will be delayed." Which psychological trigger is being used?
Urgency
FEDC:BA98:7654:3210:0800:200C:00CF:1234 - What type of ip address?
IPv6
This network topology is reliable because each node is linked to every other node. Its disadvantage is it is expensive because of the number of links needed.
mesh
Which resolution is 4K?
3840 x 2160
In Active Directory, where should you place users if you want to apply a specific security policy to only one department (e.g., Marketing)?
OU
An attacker infects the online menu of the small deli located next to a major law firm's office. They know the lawyers visit this site every day at lunch. This is known as a:
Watering Hole Attack
This device creates and broadcasts the wireless (Wi-Fi) network signal.
Access Point
An electronic device used to connect one network to another.
Router
Which resolution is 2K?
2560 x 1440