What is the Physical layer?
This layer is layer 1 of the OSI model and deals with the physical transmission of bits over cables or wireless media.
What is the security method requires a user to provide two different authentication factors to verify themselves ?
What is 2FA (Two-Factor Authentication)?
What is the process of finding and fixing errors or bugs?
What is debugging?
What is SaaS?
Software as a Service
What is the Internet of Things?
IoT is the linking of everyday devices online.
What layer does TCP operate on?
Layer 4
What is malicious software locks a victim's files and demands payment in exchange for the decryption key?
What is ransomware?
This built-in Python data type is an ordered, mutable collection of items enclosed in square brackets.
What is a list?
What is the formal commitment between a cloud provider and a customer regarding service uptime and performance standards?
What is an SLA (Service Level Agreement)?
What is a tiny data file stored on your browser that remembers?
What is a cookie?
What is layer 7?
Application Layer
What does CIA stand for?
What is confidentiality, Integrity and Availability?
What keyword is used in Python to define a new user-made function?
What is def?
What does CI/CD stand for?
What is Continuous Integration/Continuous Deployment
What is the technical term for latency or delay on a network called?
What is lag?
What layer does a hub work on?
Layer 1 or Physical Layer
What is Authentication, Authorization and Accounting
What Python library is the industry standard for data manipulation and analysis or a highly specialized species of bear?
What is a pandas?
What is the cloud made of?
Most Linux Servers
What is an LLM?
This stands for Large Language Model, and it refers to the type of AI that powers chatbots like ChatGPT.
What does OSI stand for?
Open System Interconnection
What is a sneaky tactic involves using fake emails or websites to trick you into giving away personal information?
What is phishing?
What is the process converts data stored in the cloud into unreadable code to prevent unauthorized access?
What is encryption (in-transit and at-rest)?
What type of database is designed to handle unstructured or rapidly changing data?
What is NoSQL?
What is the name of the Hacker's Quarterly?
2600