Which type of malware records a user's credentials and other entries?
Keylogger
What is the process of confirming user credentials?
Authentication
Convert 128 to Binary
10000000
What is the IP utility used to test connectivity with a remote host?
ping
The primary function of this system is to initialize and test the hardware components during the boot process
BIOS
What is the term for the unique address assigned to a device on a LAN network?
MAC Address
What type of attack blocks access to legitimate users?
DoS
Decimals use what base?
Base 10
Which TCP/IP protocol operates on port 80?
HTTP
This is used to connect hard drives and solid state drives to the Motherboard?
SATA Drive Interface
What is the name of the tool used to hide your IP address across a Network?
Virtual Private Network (VPN)
What is the term for someone who legally tests security?
White Hat
What Base is Binary?
2
Which networking component connects multiple devices within a LAN and forwards data?
Switch
What RAID level requires 2 drives and evenly splits data for high performance?
RAID 0
What component primary function is to relay packets across a network?
Router
What type of hacking exploits human behavior?
Social Engineering
convert 10.168.1.0 into binary
00001010.10101100.00000001.00000000
What device sends packets out every port to connect many computers?
Hub
For a performance-intensive gaming computer, which type of RAM is most suitable?
DDR5
What is the standard protocol used for sending emails?
SMTP
What does 'C I A' stand for in the CIA Triad?
Confidentiality, Integrity and Avalibility
Convert 11111000 to Decimal
248
In networking, what is the term for the process of reviewing logs and records?
Auditing
What is the first step in the CompTIA troubleshooting methodology?
Identify