?
A+
Security+
Network+
100

What number system is this message written in

01101001 01101101 01110000 01100001 01100011 01110100 00001010

binary

100

T/F: Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.

False

100

What is a social engineering technique that involves the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information?

Phishing

100

What is the basic command that allows a user to test and verify if a particular destination IP address exists and can accept requests in computer network administration

ping

200

What are the 3 key concepts of Cyber Security?


“The CIA Triad“.

It consists of Confidentiality, Integrity, and Availability

200

What makes up approximately 1 billion bytes

1 Gigabyte

200

What is a security mechanism that creates a virtual trap to lure attackers?

honeypot

200

What is the port for Hypertext Transfer Protocol (HTTP) ?

port 80

300

What is port 123?

Network Time Protocol (NTP)

300

What type of Ethernet cable is used to establish a direct communication link between two PCs?

Cross-over cable

300

What is the difference between Symmetric and Asymmetric Encryption?

Symmetric encryption uses ONE key for both encryption and decryption

Asymmetric uses Private and Public Keys for encryption and decryption

300

The Open Systems Interconnection (OSI) model consists of how many layers, Name Them

  • Physical Layer (Layer 1) :
  • Data Link Layer (DLL) (Layer 2) :
  • Network Layer (Layer 3) :
  • Transport Layer (Layer 4) :
  • Session Layer (Layer 5) :
  • Presentation Layer (Layer 6) :
  • Application Layer (Layer 7) :
400

The heart of the operating system is the ________

kernel

400

T/F: The main difference between UTP and STP cabling is that STP cables have additional protective covers that reduce signal interference from outside source

true 

400

A __ is a piece of malicious code that interferes with normal system functions and goes to great lengths not to be discovered, or if discovered and removed, to reestablish itself whenever possible

rootkit

400

The ______ table contains IP-to-MAC address mappings.

ARP (address resolution protocol)

M
e
n
u