What number system is this message written in
01101001 01101101 01110000 01100001 01100011 01110100 00001010
binary
T/F: Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.
False
What is a social engineering technique that involves the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information?
Phishing
What is the basic command that allows a user to test and verify if a particular destination IP address exists and can accept requests in computer network administration
ping
What are the 3 key concepts of Cyber Security?
“The CIA Triad“.
It consists of Confidentiality, Integrity, and Availability
What makes up approximately 1 billion bytes
1 Gigabyte
What is a security mechanism that creates a virtual trap to lure attackers?
honeypot
What is the port for Hypertext Transfer Protocol (HTTP) ?
port 80
What is port 123?
Network Time Protocol (NTP)
What type of Ethernet cable is used to establish a direct communication link between two PCs?
Cross-over cable
What is the difference between Symmetric and Asymmetric Encryption?
Symmetric encryption uses ONE key for both encryption and decryption
Asymmetric uses Private and Public Keys for encryption and decryption
The Open Systems Interconnection (OSI) model consists of how many layers, Name Them
The heart of the operating system is the ________
kernel
T/F: The main difference between UTP and STP cabling is that STP cables have additional protective covers that reduce signal interference from outside source
true
A __ is a piece of malicious code that interferes with normal system functions and goes to great lengths not to be discovered, or if discovered and removed, to reestablish itself whenever possible
rootkit
The ______ table contains IP-to-MAC address mappings.
ARP (address resolution protocol)