TECH 001
TECH 002
TECH 003
TECH 004
TECH 005
100

This email authentication protocol, which stands for Domain-based Message Authentication, Reporting, and Conformance, helps prevent email spoofing and phishing attacks by allowing domain owners to specify policies for email handling.

What is DMARC?

100

This RAID configuration combines disk mirroring and disk striping to protect data, and is often described as a 'stripe of mirrors'."

What is RAID 10?

100

This first step in the boot process, initiated by firmware in the computer's BIOS or UEFI, tests major hardware components and prepares the system to load the operating system, often signified by a single beep.

What is the Power-On Self Test (POST)?

100

This device measures or maintains orientation, based on the principles of angular momentum, and is often used in navigation systems, smartphones, and gaming controllers.

What is a Gyroscope?

100

This process uses rule-based logic to automate manual tasks like data entry and invoice approval, improving efficiency and reducing errors in business processes.

What is Workflow Automation?

200

In networking terms, this is a physical location that serves as an access point to the internet, and it houses servers, routers, and other telecommunications equipment.

What is a Point of Presence (PoP)?

200

This RAID configuration provides data striping at the byte level and also stripe error correction information, offering a good balance of data protection, system performance, and usable capacity.

What is RAID 5?

200

This cylindrical drum in a laser printer is electrostatically charged by a laser to attract and transfer toner particles onto paper to create an image.

What is a Photosensitive Drum?

200

This digital cellular technology uses spread spectrum techniques to allow multiple users to share the same band of frequencies by assigning unique code sequences to each user.

What is Code Division Multiple Access (CDMA)?

200

This adjustable setting in a printer determines the distance between the print head and the paper, affecting print quality and the ability to accommodate different paper thicknesses.

What is the Platen Gap?

300

This term refers to a control panel on a computer monitor or television screen that allows you to adjust certain features such as brightness, contrast, and color settings.

What is On-Screen Display (OSD)?

300

This term refers to a sector on a computer's disk drive or flash memory that is no longer reliable for storing and retrieving data because it has been physically damaged or worn out.

What are Bad Blocks?

300

This networking device distributes incoming network traffic across multiple servers to ensure efficient utilization of resources, improve performance, and enhance high availability of applications and services.

What is a Load Balancer?

300

This networking standard, often referred to as Gigabit Ethernet, uses four pairs of twisted-pair copper cables to transmit data at a rate of 1 gigabit per second.

What is 1000BASE-T?

300

These hypervisors are installed directly on top of the host operating system and rely on it to manage hardware resources, enabling virtualization of multiple guest operating systems.

What are Host-based Hypervisors?

400

In a fiber-optic broadband setup, this device is installed at the customer's premises and connects to the Optical Line Terminal (OLT) over the Passive Optical Network (PON). It converts fiber-optic light signals to electrical signals.

What is an Optical Network Terminal (ONT)?

400

This term describes a condition where a computer's hard drive is constantly reading and writing data due to insufficient memory, leading to a significant degradation in system performance.

What is Disk Thrashing?

400

This security measure requires two types of identification to access a system, typically something you know (like a password) and something you have (like a token or smartphone), providing an additional layer of protection against unauthorized access.

What is Two-Factor Authentication (2FA)?

400

In the context of IT security, this term describes the uncontrolled growth and proliferation of multiple and disparate systems, often leading to increased complexity, inefficiency, and security vulnerabilities.

What is Security Sprawl?

400

This Ethernet standard, also known as PoE++ (Power over Ethernet Plus Plus), provides higher power levels for devices such as wireless access points, IP cameras, and industrial equipment, delivering up to 90 watts of power over Ethernet cables.

What is 802.3bt?

500

This approach to network management allows network administrators to manage network services through abstraction of lower level functionality, offering benefits in terms of network agility and flexibility.

What is Software Defined Networking (SDN)?

500

This dedicated device connected to a network provides a central location for data storage and sharing, often used in home and business environments for backup, file sharing, and media streaming.

What is a Network Attached Storage (NAS)?

500

In the context of computer security, this technique involves adding special characters to data to prevent it from being interpreted as executable code, often used to prevent Cross-Site Scripting (XSS) attacks.

What is Escape or Escaping?

500

This widely adopted set of standards defines the physical and data link layer specifications for Ethernet networks, including the popular variants such as 10BASE-T, 100BASE-TX, and 1000BASE-T.

What is IEEE 802.3?

500

This term stands for a security architecture framework in network systems which respectively validates a user's identity, determines what that user is allowed to do, and records what the user actually does.

What is Authentication, Authorization, and Accounting (AAA)?