Concepts
Applications
Infrastructure
Networks
Security
100

One thousand bytes equals this measure.

What is a kilobyte?

100

The best application type for maintaining sales records and customer information for constant updates by multiple users

What is a database?

100

The primary purpose of a UPS is to protect against these.

What are power outages?

100

The time it takes to transfer a data packet from one computer to another.

What is latency?

100

These three properties make up the CIA Triad.

Confidentiality, Integrity, Availability

200

The FINAL step in the standard troubleshooting methodology

What is Documenting the solution

200
This intellectual property protection is the best way to safeguard a developer's rights to the user instructions for a software package.

What is copyright?

200

This kind of wireless communication requires devices to be within six centimeters (2 inches) of each other to transfer information.

What is NFC?

200

These network protocols are used when receiving email on the internet.

What are IMAP and POP3?

200

This application should be installed to seek out and remove malicious software.

What is Antivirus?

300

A notational system used to represent an “on” or “off” state

What is binary

300

This software licensing model allows someone to modify the original code and release their own version of an application.

What is open source?

300

This device allows wireless devices to communicate to a wired network.  

What is a wireless access point?

300

This standard is best for securing a wireless network.

What is WPA2?

300

This security model requires the administrator to configure permissions based on a user's position within the organization.

What is role-based access?

400

Reusable segment of code that returns a value.

What is a function?

400

This kind of software application makes use of the SMTP protocol.

What is email?

400

These connectors are found at the end of twisted pair network cables.

What are RJ-45?

400

This computing device provides a centralized means of distributing web services to clients on a LAN.

What is a server?

400

A shortened representation of data used to prove that a message has not been tampered with.

What is a cryptographic hash?

500

This programming command causes an action to continue as long as a condition is TRUE.

What is FOR...WHILE?

500
This term describes a limitation on data entered into a database, ensuring only valid values are accepted.

What is a constraint?

500

This program interacts directly with hardware to manage storage, networks, and virtual machines.

What is a Type 1 hypervisor?

500

This network component connects computers in an Ethernet LAN using network ports and cabling.

What is a switch?

500

Antivirus applications use these to identify malware and prevent it from executing (two items).

What are signatures and heuristics?