Hardware
Software
OS
Network
CyberSecurity
100

An electronic device for storing and processing Data, takes input and give output

What is a Computer?

100

Instructs hardware to perform tasks

What is Software?

100

Software that supports a computer's basic functions, tasks, executing applications and controlling peripherals.

What is an Operating System?

100
A group of interconnected devices (PCs, Phones, Tablets, Servers) that can communicate and share data resources. 

What is a Network?

100

Security flaws become widely known once updates are released. This helps quickly reduce exposure.

What is Software Patching?

200

Physical Parts or components of a computer

What is computer hardware

200

Code written to perform a specific task.

What is a program?

200

A specialized, low level software embedded directly into the hardware. provides essential instructions that allow the hardware to communicate with the OS.

What is Firmware?

200

A network security system that monitors and controls incoming and outgoing network traffic protecting against unauthorized access.

What is a Firewall?

200

Restrict access so every user and device must be verified continuously. This reduces lateral movement opportunities for attackers.

What is Zero-Trust Security Policy?

300

A computer that is portable and suitable for use while traveling

What is a Laptop?

300

Chrome, Edge, Firefox are examples of

What is Internet (Web) Browsers?

300

The name of the operating system installed by Microsoft Computers? 

What is Windows?

300

A set of rules that defines how data packets are addressed and routed across a network.

What is IP (Internet Protocol)?

300

This type of attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests. 

What is a Denial of Service Attack. (DoS) Attack?

400

RAM stand for this

What is Random Access Memory?

400

Software that runs within the OS to execute specific tasks based on its coded theme.

What is an Application (App)

400
The Operating System installed on an Apple computer.

What is MacOS?

400

A system that translates domain names like google.com into IP addresses

What is Domain Name System (DNS)?

400

This attack occurs when a malicious actor sends an email that seems to be coming from a trusted source in an attempt to grab sensitive information from a target. 

What is a Phishing Attack?

500

The primary storage component of a computer which holds all software and data.

What is a HDD or SSD?

500

Manipulating data within a computer RAM, CPU, and Storage Device. 

What is data processing?

500

The operating system that was designed by Freeware writers across the World Wide Web.

What is Linux?

500

While not a Wi-Fi type itself, this can encrypt your internet traffic making it valuable for securing your data through the internet. 

What is a Virtual Private Network (VPN)?

500

This type of attack allows the eavesdropper to view the data sent back and forth between two devices, networks, or people. The attacker is spying on the interaction between two parties.

What is a Man-in-the-Middle Attack (MITM)?
M
e
n
u