Concepts
Applications
Infrastructure
Networks
Security
100

One thousand bytes equals this measure.

What is a kilobyte?

100

The best application type for maintaining sales records and customer information for constant updates by multiple users

What is a database?

100

The primary purpose of a UPS is to protect against these.

What are power outages?

100

The amount of data that can be transferred over a network connection in a given amount of time, typically measured in bits or bytes per second.

What is transfer rate?

100

A secure tunnel through the internet or another unsecure network.

What is a Virtual Private Network (VPN)?

200

The FINAL step in the standard troubleshooting methodology

What is Documenting the solution

200
This intellectual property protection is the best way to safeguard a developer's rights to the user instructions for a software package.

What is copyright?

200

This kind of wireless communication requires devices to be within six centimeters (2 inches) of each other to transfer information.

What is NFC?

200

These network protocols are used when receiving email on the internet.

What are IMAP and POP3?

200

This application should be installed to seek out and remove malicious software.

What is Antivirus?

300

This symbol set is the most likely to be used to represent international data.

What is Unicode?

300

This kind of software runs on a web server and is accessed by clients using a web browser.

What is a web application?

300

This specialized printer uses heat-sensitive paper rather than ink.

What is a thermal printer?

300

255.255.255.0 is an example of this.

What is a subnet mask?

300

Hardware or software security tool that contains some sort of authentication data; often used as part of two-factor authentication.

What is a token?

400

The decimal value of 10 is equal to this in hexadecimal notation.

What is A?

400

This Windows option enables the user to perform an action, such as running a script, automatically at a preset time or in response to a trigger.

What is Task Scheduler?

400

Bus interface that connects host bus adapters to mass storage devices.

What is SATA?

400

This 48-bit value may be expressed as six groups of two hex digits or three groups of four hex digits, like this: 0060.8c12.3abc

What is a MAC address?

400

An attack that exploits a software vulnerability unknown to the vendor.

What is a Zero Day exploit?

500

The binary value 11111111 is equivalent to this in decimal notation.

What is 255?

500

Results of the following SQL query:

SELECT * FROM Students

WHERE Program="Information Technology"

   ORDER BY Name;

What is retrieve records for IT students and sort them in alphabetical order?

500

This data redundancy option provides striping with parity and requires at least three disks; it can withstand the failure of a single disk.

What is RAID 5?

500

What protocol and port would you use to read your email on multiple devices?

What is IMAP, Port 143?

500

A shortened representation of data used to prove that a message has not been tampered with.

What is a cryptographic hash?

M
e
n
u