What is a bit (binary digit)?
Software designed to view HTML pages.
What is a browser?
These allow communication between components on a motherboard and peripheral devices.
What are buses?
An established set of rules that determine how data is transmitted between different devices in the same network.
What is a network protocol?
This kind of malware comes hidden within an apparently innocuous application.
What is a Trojan Horse?
An identifier for a group of variables of the same type; the number of elements is fixed when it is declared.
What is an array?
This scripting language is often used to add interactivity to web pages and HTML-format email but may also be used maliciously.
What is JavaScript?
An area on the hard drive allocated to pages of memory, reducing the demands on RAM.
What is Virtual Memory?
This is hardware that acts as a connection between different networks.
What is a gateway? (A router is a networking layer system used to manage and forward data packets to devices network)
A means for users to prove their identity to a computer system.
What is authentication?
A data type supporting one-bit storage, representing the FALSE and TRUE logical conditions.
What is Boolean?
In Windows, the configuration database; it may be edited by experienced users.
What is the registry?
The partition containing the \Windows folder.
What is the boot partition?
These file sharing networks distribute data among clients using the network instead of using a client-server structure.
What are Peer-to-Peer networks?
An attack in which the perpetrator intercepts communication between two hosts.
What is a Man in the Middle or On-path attack?
This data type supports the storage of decimal fractions.
What is a float?
Software that identifies the shapes of characters to convert them from printed images to data files that may be modified in a word processing application.
What is OCR (Optical Character Recognition)?
A memory module with a smaller form than standard DIMM modules, made to fit laptops and notebooks.
What is SODIMM?
Which protocol uses Port 25 for internet email?
What is SMTP (Simple Mail Transfer Protocol)?
This ensures that critical business functions enjoy a high degree of availability and fault tolerance.
What is a Business Continuity Plan OR Continuity of Operations Plan?
A unique new algorithm in a software application could be protected in these two ways.
What are patent and copyright?
Two types of software licensing.
What are site license, concurrent license, open license, and group license?
Two features of NTFS.
What are 64-bit address space, file by file compression, RAID support, encryption, disk quotas, or advanced file attribute management?
This is a website or webpage to which a client is redirected before the granting of full network access; it provides a limited set of functions.
What is a captive portal?
Standard security technology for establishing an encrypted link between a server and a client, providing privacy and authentication over the internet.
What is SSL (Secure Sockets Layer)?