acronyms
IT history
Oz
security
Ports
100

what does FTP stand for

File Transfer Protocol

100

This man is considered to be the "father of the computer".

Who is Charles Babbage?

 

100

what is the main character in the wizard of oz

Dorothy gale 

100

What are the 3 key concepts of IT security?

confidentiality, integrity, and availability.

100

what is port 22

the Secure Shell (SSH) protocol 

200

what does HTTP stand for what is

HyperText Transfer Protocol

200

This ALGOL-based programming language designed by Niklaus Wirth in approximately 1970 with the goal of teaching structured programming.

What is Pascal?

200

who wrote the wizard of oz 

  L. Frank Baum



200

This principle refers to the practice of limiting each user on a network to the least amount of privilege necessary to perform a function to reduce the impact of a compromised account.

What is Least Privilege Principle?

200

what is Port 80 

Hypertext Transfer Protocol (HTTP)

300

what does DNS stand for what is

Domain Name System

300

This was the first personal computer to use a GUI.

What is the Apple Lisa?

300

how many oz books were written

14

300

In WPA2, this type of authentication uses a passphrase to generate the key used to encrypt communications.

What is PSK (pre-shared key)?

300

what is port 53

 Domain Name Service (DNS)

400

what does POST stand for what is

Power-on self test

400

What was the first widely used web browser?

What is Mosaic?

400

who is the credit director of the wizard of Oz (1939)

 Victor Fleming

400

This word describes the methods to improve a device's security by changing its default configuration, often by implementing the recommendations in published secure baselines.

What is hardening?

400

what is port 443

 HTTPS (Hypertext Transfer Protocol Secure) 


500

what does POTS stand for 

Plain old telephone service

500

What was the first widely used personal computer?

What is the MITS Altair 8800?

500

* Daily Double *

what is the name of the good witch of the south

locasta or tattypoo

500

This is a collection of standard configurations and settings for network devices, software, patching and updates, access controls, logging, monitoring, password policies, encryption, endpoint protection, and many others that improves security, manageability, and operational efficiencies by establishing consistent and centralized rules and procedures regarding configuring and securing the environment.

What is a secure baseline?

500

* Daily Double *

what is port 3389?

What is Remote Desktop Protocol?

M
e
n
u