What does the acronym SSD stand for?
Solid-State Drive
What type of virus self replicates?
Worm
What is the binary representation of the decimal number 255?
11111111
What is the term for a network that covers a small geographic area, typically within a single building or campus?
LAN
What is the first step in the CompTIA troubleshooting methodology?
Identify the Problem
What type of cable is commonly used for Ethernet connections?
Twisted Pair
What security model focuses on the principles of least privilege and separation of duties?
Role-Based Access Controls
Convert the binary number 11010101 to decimal.
213
N.h.h.h is an example of which subnetting class?
Class A
What is the main function of RAM in a computer?
To temporarily store data for quick access by the CPU
What is the term for a software component that manages network traffic?
Firewall
What kind of attack involves tricking users into providing sensitive information?
Phishing
Convert 128 into Binary
10000000
Port 22 refers to what protocol?
FTP
What self-test is performed by a computer during the boot-up process to check hardware functionality?
POST (Power-On Self-Test)
What is the term for a secure method of transmitting data over a network?
Encryption
What is the term for unauthorized access to a system?
Breach
What is the result of adding the binary numbers 1011 and 1101?
00011000 or 24
What type of network is used for businesses that stretch across a city and need to be on the same network?
MAN
In the seven-step methodology, what step involves testing the theory of probable cause?
Test Theory
What is the term used to describe a payload that activates after specific conditions are met?
Logic Bomb
What type of attack uses multiple compromised systems to flood a target with traffic?
Distributed Denial of Service (DDoS)
Subtract the binary number 1010 from 1101 and provide the result.
0011 or 3
What is the maximum number of Host for this network?
N.N.h.h
16,384
What does the acronym RAID stand for in data storage?
Redundant Array of Independent Disks