What does NTFS stand for?
New Technology File System
Which of the following is a common type of social engineering attack?
What tool would you use to analyze network traffic?
Wireshark
What does PC stand for?
Personal Computer
What does WoW stand for?
World of Warcraft
What is DHCP and why is it important?
DHCP stands for dynamic host configuration protocol. It's a method for assigning dynamic internet protocol, or IP, addresses to devices that are connected to the network.
The main benefits of DHCP are workload reduction and improved efficiency. System administrators don't have to assign IP addresses through manual configuration, streamlining critical functions.
How can you ensure secure remote access to a network?
VPN
What network protocol is used to send email?
Simple Mail Transfer Protocol (SMTP)
What year was Google created?
1998
What year did Mario 64 come out? (3 possible answers)
June 23, 1996, in Japan, September 29, 1996, in North America, and March 1, 1997, in Europe/Australia
Can you explain the role of SSH in system administration?
SSH (Secure Shell) is the industry-standard tool for managing servers and network devices securely over unencrypted networks like the internet
What does TLS and SSL stand for?
Transport Layer Security and Secure Sockets Layer
What does a network loop do?
causing data packets to circulate endlessly. This creates "broadcast storms" that saturate bandwidth, leading to massive network congestion, high latency, packet loss, and frequent, total network failure. It often results from human error, such as misconfigured cables.
Who invented the first electronic digital computer?
The first electronic digital computer, the Atanasoff-Berry Computer (ABC), was invented by Dr. John Vincent Atanasoff and his graduate assistant Clifford Berry. Conceived in 1937 and tested in 1942 at Iowa State College, the ABC introduced key concepts like binary arithmetic and vacuum tube electronics
What was the first graphical (non-text only) MMORPG?
Neverwinter Nights
What is load balancing?
Load balancing is the process of efficiently distributing incoming network traffic or application requests across multiple servers, preventing any single server from becoming overwhelmed
What is the difference between 'Zero Trust' and 'Least Privilege'?
Zero Trust authenticates the user, while Least Privilege restricts what they can do
What the difference is between a VLAN and a Subnet?
VLANs work at Layer 2 using switch ports to isolate traffic physically, while subnets work at Layer 3 using IP address ranges. VLANs create logical, separate broadcast domains, while subnets define logical IP address groupings that require a router to communicate between them
What does CAPTCHA stand for?
Completely Automated Public Turing test to tell Computers and Humans Apart
What was the first gaming console?
Magnavox Odyssey
When creating a group in Active Directory, what are the 3 group scopes?
Domain Local, Global, Universal
What is the CIA Triad?
It ensures only authorized access, maintains data accuracy, and guarantees reliable access for users. It is a fundamental framework used by security professionals to evaluate, identify weaknesses, and build robust defenses
What are the 7 layers of the OSI model?
1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application
What was the first commercially available programming language?
What was the first game to use the WASD format?
Quake (1996)