Networking
Cyber security
World History
Random
Computer random
100

What does IP stand for?

Internet Protocol

100

What does DDoS stand for in the context of cyber threats?

Distributed Denial of Service.

100

Who was the primary author of the Declaration of Independence in the United States?

Thomas Jefferson

100

A security process that requires more than one method of authentication.

multi-factor authentication

100

What does malware stand for?

Malicious Software.

200

 Explain the concept of DHCP (Dynamic Host Configuration Protocol) and its role in networking.

DHCP dynamically assigns IP addresses to devices on a network, simplifying network configuration.

200

What is ransomware, and how does it work?

Ransomware is a type of malware that encrypts files and demands a ransom for their release.

200

Which Italian explorer is credited with discovering the Americas in 1492?

Christopher Columbus

200

What is the chemical symbol for gold?

Au

200

What is a social engineering attack that tricks individuals into revealing sensitive information.

Phising

300

How many layers does the OSI model have? 

The OSI (Open Systems Interconnection) model is a conceptual framework with seven layers.

300

What does the acronym "HTTPS" stand for?

Hypertext Transfer Protocol Secure.

300

Which country was reunified in 1990, marking the end of the Cold War division in Europe?  

 Germany.

300

What is the first book in J.K. Rowling's Harry Potter series?

"Harry Potter and the Philosopher's Stone" (or "Harry Potter and the Sorcerer's Stone" in the U.S.).

300

what is malicious software designed to harm or exploit computer systems.

malware

400

Explain the difference between TCP and UDP.

TCP (Transmission Control Protocol) is connection-oriented, while UDP (User Datagram Protocol) is connectionless.

400

Define the term "zero-day vulnerability"

 A zero-day vulnerability is a security flaw unknown to the vendor, making it exploitable by attackers before a fix is available.

400

What organization was established in 1945 to promote international cooperation and prevent future conflicts?

The United Nations (UN).

400

This translates human-readable domain names into IP addresses.

DNS

400

What protocol is used to retrieve email from a server?

POP3

500

What is the purpose of a subnet mask in a TCP/IP network?

To divide an IP address into network and host portions.

500

What is the first line of defense against unauthorized access to a computer network?

Firewalls

500

Which explorer led the first expedition to circumnavigate the globe?

Ferdinand Magellan

500

What is the square root of 64?

8

500

In encryption, what is the term for the original, unencrypted data?

Plaintext.