Santa's Elves
Naughty List
Snowflakes
Santa's Reindeers
100

This email authentication protocol, which stands for Domain-based Message Authentication, Reporting, and Conformance, helps prevent email spoofing and phishing attacks by allowing domain owners to specify policies for email handling.

What is DMARC?

100

This RAID configuration combines disk mirroring and disk striping to protect data, and is often described as a 'stripe of mirrors'."

What is RAID 10?

100

This first step in the boot process, initiated by firmware in the computer's BIOS or UEFI, tests major hardware components and prepares the system to load the operating system, often signified by a single beep.

What is the Power-On Self Test (POST)?

100

This device measures or maintains orientation, based on the principles of angular momentum, and is often used in navigation systems, smartphones, and gaming controllers.

What is a Gyroscope?

200

In networking terms, this is a physical location that serves as an access point to the internet, and it houses servers, routers, and other telecommunications equipment.

What is a Point of Presence (PoP)?

200

This RAID configuration provides data striping at the byte level and also stripe error correction information, offering a good balance of data protection, system performance, and usable capacity.

What is RAID 5?

200

This cylindrical drum in a laser printer is electrostatically charged by a laser to attract and transfer toner particles onto paper to create an image.

What is a Photosensitive Drum?

200

This digital cellular technology uses spread spectrum techniques to allow multiple users to share the same band of frequencies by assigning unique code sequences to each user.

What is Code Division Multiple Access (CDMA)?

300

This term refers to a control panel on a computer monitor or television screen that allows you to adjust certain features such as brightness, contrast, and color settings.

What is On-Screen Display (OSD)?

300

This term refers to a sector on a computer's disk drive or flash memory that is no longer reliable for storing and retrieving data because it has been physically damaged or worn out.

What are Bad Blocks?

300

This networking device distributes incoming network traffic across multiple servers to ensure efficient utilization of resources, improve performance, and enhance high availability of applications and services.

What is a Load Balancer?

300

This networking standard, often referred to as Gigabit Ethernet, uses four pairs of twisted-pair copper cables to transmit data at a rate of 1 gigabit per second.

What is 1000BASE-T?

400

In a fiber-optic broadband setup, this device is installed at the customer's premises and connects to the Optical Line Terminal (OLT) over the Passive Optical Network (PON). It converts fiber-optic light signals to electrical signals.

What is an Optical Network Terminal (ONT)?

400

This term describes a condition where a computer's hard drive is constantly reading and writing data due to insufficient memory, leading to a significant degradation in system performance.

What is Disk Thrashing?

400

This security measure requires two types of identification to access a system, typically something you know (like a password) and something you have (like a token or smartphone), providing an additional layer of protection against unauthorized access.

What is Two-Factor Authentication (2FA)?

400

In the context of IT security, this term describes the uncontrolled growth and proliferation of multiple and disparate systems, often leading to increased complexity, inefficiency, and security vulnerabilities.

What is Security Sprawl?

500

This approach to network management allows network administrators to manage network services through abstraction of lower level functionality, offering benefits in terms of network agility and flexibility.

What is Software Defined Networking (SDN)?

500

This dedicated device connected to a network provides a central location for data storage and sharing, often used in home and business environments for backup, file sharing, and media streaming.

What is a Network Attached Storage (NAS)?

500

In the context of computer security, this technique involves adding special characters to data to prevent it from being interpreted as executable code, often used to prevent Cross-Site Scripting (XSS) attacks.

What is Escape or Escaping?

500

This widely adopted set of standards defines the physical and data link layer specifications for Ethernet networks, including the popular variants such as 10BASE-T, 100BASE-TX, and 1000BASE-T.

What is IEEE 802.3?