Terminology
Security
Binary
Networking
CompTia
100

Which type of malware records a user's credentials and other entries?

Keylogger

100

What is the process of confirming user credentials?

Authentication

100

Convert 128 to Binary

10000000

100

What is the IP utility used to test connectivity with a remote host?

ping

100

The primary function of this system is to initialize and test the hardware components during the boot process

BIOS

200

What is the term for the unique address assigned to a device on a LAN network?

MAC Address

200

What type of attack blocks access to legitimate users?

DoS

200

Decimals use what base?

Base 10

200

Which TCP/IP protocol operates on port 80?

HTTP

200

This is used to connect hard drives and solid state drives to the Motherboard?

SATA Drive Interface

300

What is the name of the tool used to hide your IP address across a Network?

Virtual Private Network (VPN)

300

What is the term for someone who legally tests security?

White Hat

300

What Base is Binary?

2

300

Which networking component connects multiple devices within a LAN and forwards data?

Switch

300

What RAID level requires 2 drives and evenly splits data for high performance?

RAID 0

400

What component primary function is to relay packets across a network?

Router

400

What type of hacking exploits human behavior?

Social Engineering

400

convert 10.168.1.0 into binary

00001010.10101100.00000001.00000000

400

What device sends packets out every port to connect many computers?

Hub

400

For a performance-intensive gaming computer, which type of RAM is most suitable?

DDR5

500

What is the standard protocol used for sending emails?

SMTP

500

What does 'C I A' stand for in the CIA Triad?

Confidentiality, Integrity and Avalibility 

500

Convert 11111000 to Decimal

248

500

In networking, what is the term for the process of reviewing logs and records?

Auditing

500

What is the first step in the CompTIA troubleshooting methodology?

Identify

M
e
n
u