What does IP stand for?
Internet Protocol
What does DDoS stand for in the context of cyber threats?
Distributed Denial of Service.
Who was the primary author of the Declaration of Independence in the United States?
Thomas Jefferson
A security process that requires more than one method of authentication.
multi-factor authentication
What does malware stand for?
Malicious Software.
Explain the concept of DHCP (Dynamic Host Configuration Protocol) and its role in networking.
DHCP dynamically assigns IP addresses to devices on a network, simplifying network configuration.
What is ransomware, and how does it work?
Ransomware is a type of malware that encrypts files and demands a ransom for their release.
Which Italian explorer is credited with discovering the Americas in 1492?
Christopher Columbus
What is the chemical symbol for gold?
Au
What is a social engineering attack that tricks individuals into revealing sensitive information.
Phising
How many layers does the OSI model have?
The OSI (Open Systems Interconnection) model is a conceptual framework with seven layers.
What does the acronym "HTTPS" stand for?
Hypertext Transfer Protocol Secure.
Which country was reunified in 1990, marking the end of the Cold War division in Europe?
Germany.
What is the first book in J.K. Rowling's Harry Potter series?
"Harry Potter and the Philosopher's Stone" (or "Harry Potter and the Sorcerer's Stone" in the U.S.).
what is malicious software designed to harm or exploit computer systems.
malware
Explain the difference between TCP and UDP.
TCP (Transmission Control Protocol) is connection-oriented, while UDP (User Datagram Protocol) is connectionless.
Define the term "zero-day vulnerability"
A zero-day vulnerability is a security flaw unknown to the vendor, making it exploitable by attackers before a fix is available.
What organization was established in 1945 to promote international cooperation and prevent future conflicts?
The United Nations (UN).
This translates human-readable domain names into IP addresses.
DNS
What protocol is used to retrieve email from a server?
POP3
What is the purpose of a subnet mask in a TCP/IP network?
To divide an IP address into network and host portions.
What is the first line of defense against unauthorized access to a computer network?
Firewalls
Which explorer led the first expedition to circumnavigate the globe?
Ferdinand Magellan
What is the square root of 64?
8
In encryption, what is the term for the original, unencrypted data?
Plaintext.