Security
Social Engineering
networking
Network Topology
Laptop/Display
100

 technology allows a user to log in once and gain access to multiple different systems without being prompted for a password again

SSO

100

What is the primary difference between Phishing and Whaling?

CEOs, CFOs

100

This Ethernet cable has a maximum bandwidth of 10 Gbps (or 10000 Mbps)

Cat 6

100

This network topology has a device like a router or a hub at the center. Main advantage is low cost and flexibility. Disadvantage is the reliance on the router, if it fails, communication among computers on the network is disrupted.

Star

100


What can you upgrade in your laptop to make programs run smoother and handle more tasks at one time?

RAM

200

 type of malware is a collection of "zombie" computers controlled by a central server

Botnet

200

An attacker spends weeks researching a specific HR manager, learning the names of their children and their recent vacation destination. They then send a highly personalized email about a "school emergency." This is an example of:

Spear Phishing

200


The maximum amount of data that a network medium can theoretically transfer.

Bandwidth




200

This network topology is simple and flexible because nodes can just be added to the line. A disadvantage is that more users = slower connections, also if there is a short or break in the line, nodes after the failure lose service.

Bus

200

 

Which resolution is Full HD?


1920 x 1080

300

 Windows feature should be disabled to prevent a malicious USB (such as a Rubber Ducky) from running a script the moment it is plugged in

AutoRun

300

You receive a phone call from "Microsoft Support" claiming your PC is sending out viruses. They ask for remote access to "fix" it. Since you didn't call them, what should you do?

Hang up and call the official support number from the company's website.

300

The IEEE standard for Wireless (Wi-Fi)

802.11

300


Any computer or electronic device connected to a network.

node

300


This type of component can be easily and quickly replaced by the user or technician without having to send the whole system back to the manufacturer for repair.

Field Replaceable Unit

400

security principle ensures that a user is provided with only the minimum permissions necessary to perform their specific job

Principle of Least Privilege

400

An email states: "Your payroll account has been suspended. You have 2 hours to verify your identity or your next paycheck will be delayed." Which psychological trigger is being used?

Urgency

400


FEDC:BA98:7654:3210:0800:200C:00CF:1234 - What type of ip address?

IPv6

400


This network topology is reliable because each node is linked to every other node. Its disadvantage is it is expensive because of the number of links needed.

mesh

400

Which resolution is 4K?

3840 x 2160

500

 In Active Directory, where should you place users if you want to apply a specific security policy to only one department (e.g., Marketing)?

OU

500

An attacker infects the online menu of the small deli located next to a major law firm's office. They know the lawyers visit this site every day at lunch. This is known as a:

Watering Hole Attack

500


This device creates and broadcasts the wireless (Wi-Fi) network signal.

Access Point

500

 

An electronic device used to connect one network to another.


Router

500

Which resolution is 2K?

2560 x 1440

M
e
n
u