CONCEPTS
APPLICATIONS
INFRASTRUCTURE
NETWORKING
SECURITY
100
The fundamental unit of data storage

What is a bit (binary digit)?

100

Software designed to view HTML pages.

What is a browser?

100

These allow communication between components on a motherboard and peripheral devices.

What are buses?

100

An established set of rules that determine how data is transmitted between different devices in the same network.

What is a network protocol?

100

This kind of malware comes hidden within an apparently innocuous application.

What is a Trojan Horse?

200

An identifier for a group of variables of the same type; the number of elements is fixed when it is declared.

What is an array?

200

This scripting language is often used to add interactivity to web pages and HTML-format email but may also be used maliciously.

What is JavaScript?

200

An area on the hard drive allocated to pages of memory, reducing the demands on RAM.

What is Virtual Memory?

200

This is hardware that acts as a connection between different networks.

What is a gateway? (A router is a networking layer system used to manage and forward data packets to devices network)

200

A means for users to prove their identity to a computer system.

What is authentication?

300

A data type supporting one-bit storage, representing the FALSE and TRUE logical conditions.

What is Boolean?

300

In Windows, the configuration database; it may be edited by experienced users.

What is the registry?

300

The partition containing the \Windows folder.

What is the boot partition?

300

These file sharing networks distribute data among clients using the network instead of using a client-server structure.

What are Peer-to-Peer networks?

300

An attack in which the perpetrator intercepts communication between two hosts.

What is a Man in the Middle or On-path attack?

400

This data type supports the storage of decimal fractions.

What is a float?

400

Software that identifies the shapes of characters to convert them from printed images to data files that may be modified in a word processing application.

What is OCR (Optical Character Recognition)?

400

A memory module with a smaller form than standard DIMM modules, made to fit laptops and notebooks.

What is SODIMM?

400

Which protocol uses Port 25 for internet email?

What is SMTP (Simple Mail Transfer Protocol)?

400

This ensures that critical business functions enjoy a high degree of availability and fault tolerance.

What is a Business Continuity Plan OR Continuity of Operations Plan?

500

A unique new algorithm in a software application could be protected in these two ways.

What are patent and copyright?

500

Two types of software licensing.

What are site license, concurrent license, open license, and group license?

500

Two features of NTFS.

What are 64-bit address space, file by file compression, RAID support, encryption, disk quotas, or advanced file attribute management?

500

This is a website or webpage to which a client is redirected before the granting of full network access; it provides a limited set of functions.

What is a captive portal?

500

Standard security technology for establishing an encrypted link between a server and a client, providing privacy and authentication over the internet.

What is SSL (Secure Sockets Layer)?