Fundamentals
This component is considered the "brain" of the computer.
What is the CPU?
The file system used by Windows 10 and 11.
What is NTFS?
This device connects multiple computers within the same LAN and uses MAC addresses to forward data.
What is a switch?
This type of attack floods a network with traffic to overwhelm systems.
What is a DDoS attack?
This type of firewall filters traffic based on port and protocol.
What is a packet-filtering firewall?
This type of memory is volatile and is cleared when the computer powers off.
What is a RAM?
This command-line tool is used in Windows to check for and repair disk errors.
What is CHKDSK?
This unique identifier is assigned to every network interface card (NIC).
What is a MAC address?
Software designed to damage or disrupt systems is collectively known as this.
What is malware?
This process transforms readable data into unreadable code.
What is encryption?
SATA, M.2, and NVMe are interfaces used by these devices.
What are storage drives (SSDs/HDDs)?
This type of account in Windows has unrestricted access to system settings.
What is the Administrator account?
The protocol responsible for translating domain names into IP addresses.
What is DNS?
A type of phishing that targets specific individuals or organizations.
What is spear phishing?
This tool scans for vulnerabilities or misconfigurations in networks.
What is a vulnerability scanner?
This device converts AC power from the wall to DC power for the computer.
What is a power supply unit (PSU)?
This Windows utility allows users to view and end running processes.
What is Task Manager?
This is the process of assigning IP addresses automatically.
What is DHCP?
A security concept that limits user access to only what is necessary.
What is the principle of least privilege?
A cryptographic hash function commonly used to verify file integrity.
What is SHA-256?
This firmware interface replaced BIOS in modern systems.
What is UEFI?
This Linux command is used to change file permissions.
What is chmod?
This IEEE standard defines wireless networking.
What is 802.11?
This attack intercepts and potentially alters communication between two parties.
What is a man-in-the-middle attack?
The 3 key components of the CIA Triad in cybersecurity
What are Confidentiality, Integrity, and Availability?