Course 2
Course 3
PD
Course 4
Course 5
100

An IPv4 address is how many bits long:

32

100

Linux divides the file permissions into?

Read, Write and Execute

100

A software that looks for keywords within a resume is also known as what?

Applicant Tracking System Scanner

100

WHat are the THREE main categories of authentication?

Something you are

Something you have

Something you know

100

What are the 3 key principles of the CIA Triad?

Confidentiality

Integrity

Availability

200

What is a protocol?

A set of rules allowing computers to communicate in specific ways

200

What is the Windows command line software we use other than CMD?

Windows Powershell

200

Each letter in STAR stories stands for what?

Situation, Task, Action, Result

200

Two popular directory services are:

Active Directory and OpenLDAP

200

A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?

Ransomware

300

Which network is suitable for a building?

LAN

300

What are different builds of called?

Distributions

300

A 30 second-1 minute intro of yourself and your experience, accomplishments, and skills is known as?

Elevator Pitch/ Tell me about yourself

300

Which feature of Active Directory allows you to implement specific configurations for users and computers?

Group Policy

300

Which type of cyber attack is performed by hackers without the use of any computer software program.

Social Engineering

400

What do the entries of an ARP table consist of?

MAC addresses and IP addresses

400

What command do we use for reading a .txt file in a separate window ?

cat

400

In the realm of goal setting, each letter in SMART goals stand for what?

Specific, Measurable, Attainable, Relavant, Timebound

400

What is a Group Policy Object

An Active Directory file which indicates settings for group policies

400

This type of backup strategy only backs up the files that have changed since the last full back.

Differential

500

Within the 2.4 GHz band, only three channels have non-overlapping frequency space. Which three of the channels do not overlap?

1, 6, 11

500

Which command is used in Linux to enable users to run programs with the security privileges of another user?

Sudo

500

"All the skills that you take with you from one job to another across whatever industries" is called what?

Transferrable Skills

500

What is NAAS - Networking as a service

Allows for the rental of expensive network gear, and the configurations to be done for you

500

What is Kerberos?

Kerberos is a security protocol which helps authenticate users based on it's use of a ticketing system