what does FTP stand for
File Transfer Protocol
This man is considered to be the "father of the computer".
Who is Charles Babbage?
what is the main character in the wizard of oz
Dorothy gale
What are the 3 key concepts of IT security?
confidentiality, integrity, and availability.
what is port 22
the Secure Shell (SSH) protocol
what does HTTP stand for what is
HyperText Transfer Protocol
This ALGOL-based programming language designed by Niklaus Wirth in approximately 1970 with the goal of teaching structured programming.
What is Pascal?
who wrote the wizard of oz
This principle refers to the practice of limiting each user on a network to the least amount of privilege necessary to perform a function to reduce the impact of a compromised account.
What is Least Privilege Principle?
what is Port 80
Hypertext Transfer Protocol (HTTP)
what does DNS stand for what is
Domain Name System
This was the first personal computer to use a GUI.
What is the Apple Lisa?
how many oz books were written
14
In WPA2, this type of authentication uses a passphrase to generate the key used to encrypt communications.
What is PSK (pre-shared key)?
what is port 53
Domain Name Service (DNS)
what does POST stand for what is
Power-on self test
What was the first widely used web browser?
What is Mosaic?
who is the credit director of the wizard of Oz (1939)
Victor Fleming
This word describes the methods to improve a device's security by changing its default configuration, often by implementing the recommendations in published secure baselines.
What is hardening?
what is port 443
HTTPS (Hypertext Transfer Protocol Secure)
what does POTS stand for
Plain old telephone service
What was the first widely used personal computer?
What is the MITS Altair 8800?
* Daily Double *
what is the name of the good witch of the south
locasta or tattypoo
This is a collection of standard configurations and settings for network devices, software, patching and updates, access controls, logging, monitoring, password policies, encryption, endpoint protection, and many others that improves security, manageability, and operational efficiencies by establishing consistent and centralized rules and procedures regarding configuring and securing the environment.
What is a secure baseline?
* Daily Double *
what is port 3389?
What is Remote Desktop Protocol?