Networking
Security
Telecom
Storage
Using an OS
100

This device forwards data packets between networks, determining the best path.

What is a Router?

100

This type of malware tricks users into installing harmful software by disguising it as legitimate.

What is a Trojan Horse?

100

This network is responsible for traditional landline phone service and connects calls over copper wires.

What is PSTN (Public Switched Telephone Network)?

100

This filesystem is used by MacOS

What is HFS?

100

This Windows utility allows users to view and manage files and folders.

What is File Explorer?

200

This protocol translates domain names like "example.com" into IP addresses.

What is DNS (Domain Name System)?

200

Encrypting data ensures this principle of the CIA triad.

What is Confidentiality?

200

This GSM standard uses a this kind of card to store subscriber information and allows users to roam between different networks.

What is SIM (Subscriber Identity Module) Card?

200

This type of storage has no moving parts and is faster and more reliable than traditional hard drives.

What is SSD (Solid-State Drive)?

200

This Linux command is used to list the contents of a directory.

What is ls?

300

This type of network is limited to a single building or campus.

What is a LAN (Local Area Network)?

300

his method verifies the identity of users by combining two or more authentication factors.

What is Multi-Factor Authentication (MFA)?

300

This term describes the maximum amount of data that can be transmitted over an internet connection in a given time.


What is Bandwidth?

300

This term describes the process of writing identical data to two or more drives to protect against failure.

What is Mirroring?

300

This is the core software that acts as a bridge between hardware and applications.

What is the Operating System?

400

This hardware device connects multiple devices within a network. (not a router)

What is a Switch?

400

This type of attack overwhelms a network or system with excessive traffic, rendering it unusable.

What is a Denial-of-Service (DoS) Attack?

400

This telecom device converts digital signals from a router into a format usable by telephone lines.

What is a Modem?

400

This RAID level stripes data across multiple drives for performance but offers no redundancy.

What is RAID 0?

400

This utility in Windows allows users to monitor processes, performance, and system resources.

What is Task Manager?

500

This IPv4 address type is used to communicate within the same network and cannot be routed externally.

What is a Private IP Address? e.g. (192.168.x.x, 10.x.x.x)

500

This technique involves converting plaintext data into unreadable ciphertext.

What is Encryption?

500

This acronym describes the process of sending voice communications over the internet instead of traditional phone lines.

What is VoIP (Voice over IP)?

500

This term describes a storage device that is connected to a network to provide centralized data access.

What is NAS (Network-Attached Storage)?

500

In Windows, this tool is used to manage disk partitions and volumes.

What is Disk Management?