Networking Infrastructures
Business Law
Finance
Cyber Security
General FBLA
100

This type of network security device monitors incoming and outgoing network traffic and decides whether to allow to block specific traffic based on a defined set of rules.

What is a firewall?

100

This type of intellectual property protects the expression of ideas, such as books, songs, and movies.

What is a copyright?

100
This is the term used to describe the personal financial plan for earning, spending, saving, and investing.

What is a budget?

100

This type of security threat involves sending fraudulent emails that appear to come from legitimate sources to trick users into revealing personal information.

What is phishing?

100

This is the number of points deducted if competitors do not follow the Dress Code or are late to the testing site.

What is five?

200

This type of network covers a large geographic area, such as a country or continent.

What is WAN?

200

This type of business organization partnership with the limited liability of a corporation.

What is a limited liability company?

200

This is the type of credit that allows you to borrow money up to a certain limit and pay it back over time with interest.

What is a credit card?

200

This is the term used to describe the process of collecting, preserving, analyzing, and presenting digital evidence from electronic devices.

What is digital forensics?

200

This is the name of the online testing software that will be provided for competitors in the events at the NLC.

What is FBLA Testing?

300

This type of network is characterized by having no central server and allowing each node to share resources and files with other nodes

What is a peer-to-peer network?

300

This type of legal document specifies the rights and obligations of parties involved in a real estate transaction.

What is a contract for sale?

300

This is the type of insurance that protects against financial loss due to illness, injury, or death.

What is life insurance?

300

This type of security method involves using biometric features such as fingerprints or iris scans to verify a user's identity.

What is biometric authentification?

300

This is the term used to describe the etiquette rules for electronic messaging.

What is netiquette?

400

This type of protocol defines how data is formatted and transmitted over the internet.

What is TCP/IP?

400

This type of legal document is required for certain contracts under the Statute of Frauds.

What is a written contract?

400

This type of reaction between lanarkite and copper phosphide is claimed to produce a room-temperature superconductor. 

What is a solid-state reaction?

400

This is the type of cryptography algorithm that uses two different keys, one public and one private, to encrypt and decrypt data.

What is public key cryptography?

400

This is the number of entries per event that each state may submit for the NLC.

What is four?

500

This layer of the OSI model is responsible for establishing, maintaining, and terminating connections between applications.

What is the session layer?

500

This type of liability applies when a product causes harm to a consumer regardless of the manufacturer’s fault.

What is strict liability?

500

This type of tax form is used by individuals with no dependents and only income from wages, salaries, tips, unemployment compensation, or taxable scholarships and fellowship grants.

What is 1040EZ?

500

This type of encryption standard uses a 128-bit block size and a variable key length of 128, 192, or 256 bits.

What is AES?

500

This annual event is the culmination of the FBLA-PBL year, where students from across the United States and beyond gather to compete in leadership events, share their achievements, and learn new ideas about shaping their career future.

What is the FBLA National Leadership Conference? 

M
e
n
u