PORTS
1101
1102
NET+
SEC+
100

what is the port for SSH

A:23

B:20

C:25

D:22

D: 22

100

Motherboard form factor 9.6 x 9.6

A:mITX

B:mATX

C:MINI ITX

D:ATX

B:mATX

100

what is the MAC operating system?

A:IOS

B:APFS

C:OS X

D:Redhat

C :OS X

100
What is the range for Class A

A:0-127

B:127-191

C:0-10

D:191-223

A:0-127

100

What is the scoring system for CVE?

A:CBSS

B:CVSS

C:CASS

D:SAST

B:CVSS

200

Port 88

A:RADIUS

B:KERBEROS

C:EAP

D:TACACS

B:KERBEROS

200

Small chipset built into the motherboard to save decryption keys, and used to verify system integrity. 

A:HSM

B:TBP

C:HCM

D:TPM

D:TPM

200

The two most recent Windows file systems covered on the current exam are?

A:APFS, EFS

B:FAT32, NTFS

C:EXT4,NTFS

D:HFS, EXFAT

B:FAT32, NTFS

200

What layer is a "SWITCH" on according to the OSI Model?

A: Layer 1

B: Layer 3

C: Layer 2
D: Layer 4

C: Layer 2

200

what is the 3 types of Power Resiliency?


UPS, Generators, surge protector 

300

Port 389

A: RDP

B:SNMP

C:LDAP

D:TFTP 

C:LDAP

300

How many pins does a HDMI have?

A:20

B:19

C:15

D:24

B:19

300

A variety of Linux, such as SUSE, Red Hat, CentOS, Debian or Ubuntu.

A:Variant 

B:OS'S

C:Distros

D:Types

300

HOW MANY BITS ARE IN A MAC ADDRESS?!

A:64

B:40

C:32

D:48

D:48

300

is a human-based attack where the goal is to extract personal, financial, or confidential using a telephone calls?

A: Phishing

B:Vishing

C:SMishing 

D:Whaling

B:Vishing

400

what port translates domain names to Ip addresses 

A:67,68

B:53

C:80

D:54

B:53

400

this component of a laser printer ensures even distribution of the toner across the imaging drum.

A:Doctor Blade

B:Carriage Belt

C:mechanical row 

D:Cartridge

A:Doctor Blade

400

A means of translating a system's private IP address into a public IP address before sending it out to a public network like the internet. 

A:NAC

B:VPN

C:NAT

D:VNC

C:NAT

400

What is the IPv6 APIPA address? 

A:Fe60

B:Fe30

C:Fe80

D:Fe40

C:Fe80

400

Code intended to take control of a system at the lowest levels. These forms of malware often install back doors and other malicious code.

A: Trojan

B:RootKit

C:Spyware

D:MITM

B:rootkit

500

what is the 4 things that DHCP gives you?

SUBNET MASK

DEFAULT GATEWAY

DNS IP 

IP

500

What are the pin colors for TIA/EIA 568A?

SG,G,SO,B,SB,O,SBR,BR

500

What are all the Trouble shooting steps in ORDER

1:Identify the problem

2:establish a theory of Probable cause

3:Test the theory

4:Establish a plan of action and implement 

5:Verify functionality

6:Document


500

what are all the standards IN ORDER regarding 802.11?

802.11a

802.11b

802.11g

802.11n

802.11ac

802.11ax

500

one of the most comprehensive data protection regulations with global implications. It empowers individuals by granting them greater control over their data in the Europe.

A:SOX

B:GDPR

C:GLBA

D:EPA

B:GDPR

M
e
n
u