An IPv4 address is how many bits long:
32
Linux divides the file permissions into?
Read, Write and Execute
A software that looks for keywords within a resume is also known as what?
Applicant Tracking System Scanner
WHat are the THREE main categories of authentication?
Something you are
Something you have
Something you know
What are the 3 key principles of the CIA Triad?
Confidentiality
Integrity
Availability
What is a protocol?
A set of rules allowing computers to communicate in specific ways
What is the Windows command line software we use other than CMD?
Windows Powershell
Each letter in STAR stories stands for what?
Situation, Task, Action, Result
Two popular directory services are:
Active Directory and OpenLDAP
A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?
Ransomware
Which network is suitable for a building?
LAN
What are different builds of called?
Distributions
A 30 second-1 minute intro of yourself and your experience, accomplishments, and skills is known as?
Elevator Pitch/ Tell me about yourself
Which feature of Active Directory allows you to implement specific configurations for users and computers?
Group Policy
Which type of cyber attack is performed by hackers without the use of any computer software program.
Social Engineering
What do the entries of an ARP table consist of?
MAC addresses and IP addresses
What command do we use for reading a .txt file in a separate window ?
cat
In the realm of goal setting, each letter in SMART goals stand for what?
Specific, Measurable, Attainable, Relavant, Timebound
What is a Group Policy Object
An Active Directory file which indicates settings for group policies
This type of backup strategy only backs up the files that have changed since the last full back.
Differential
Within the 2.4 GHz band, only three channels have non-overlapping frequency space. Which three of the channels do not overlap?
1, 6, 11
Which command is used in Linux to enable users to run programs with the security privileges of another user?
Sudo
"All the skills that you take with you from one job to another across whatever industries" is called what?
Transferrable Skills
What is NAAS - Networking as a service
Allows for the rental of expensive network gear, and the configurations to be done for you
What is Kerberos?
Kerberos is a security protocol which helps authenticate users based on it's use of a ticketing system