what is the port for SSH
A:23
B:20
C:25
D:22
D: 22
Motherboard form factor 9.6 x 9.6
A:mITX
B:mATX
C:MINI ITX
D:ATX
B:mATX
what is the MAC operating system?
A:IOS
B:APFS
C:OS X
D:Redhat
C :OS X
A:0-127
B:127-191
C:0-10
D:191-223
A:0-127
What is the scoring system for CVE?
A:CBSS
B:CVSS
C:CASS
D:SAST
B:CVSS
Port 88
A:RADIUS
B:KERBEROS
C:EAP
D:TACACS
B:KERBEROS
Small chipset built into the motherboard to save decryption keys, and used to verify system integrity.
A:HSM
B:TBP
C:HCM
D:TPM
D:TPM
The two most recent Windows file systems covered on the current exam are?
A:APFS, EFS
B:FAT32, NTFS
C:EXT4,NTFS
D:HFS, EXFAT
B:FAT32, NTFS
What layer is a "SWITCH" on according to the OSI Model?
A: Layer 1
B: Layer 3
C: Layer 2
D: Layer 4
C: Layer 2
what is the 3 types of Power Resiliency?
UPS, Generators, surge protector
Port 389
A: RDP
B:SNMP
C:LDAP
D:TFTP
C:LDAP
How many pins does a HDMI have?
A:20
B:19
C:15
D:24
B:19
A variety of Linux, such as SUSE, Red Hat, CentOS, Debian or Ubuntu.
A:Variant
B:OS'S
C:Distros
D:Types
HOW MANY BITS ARE IN A MAC ADDRESS?!
A:64
B:40
C:32
D:48
D:48
is a human-based attack where the goal is to extract personal, financial, or confidential using a telephone calls?
A: Phishing
B:Vishing
C:SMishing
D:Whaling
B:Vishing
what port translates domain names to Ip addresses
A:67,68
B:53
C:80
D:54
B:53
this component of a laser printer ensures even distribution of the toner across the imaging drum.
A:Doctor Blade
B:Carriage Belt
C:mechanical row
D:Cartridge
A:Doctor Blade
A means of translating a system's private IP address into a public IP address before sending it out to a public network like the internet.
A:NAC
B:VPN
C:NAT
D:VNC
C:NAT
What is the IPv6 APIPA address?
A:Fe60
B:Fe30
C:Fe80
D:Fe40
C:Fe80
Code intended to take control of a system at the lowest levels. These forms of malware often install back doors and other malicious code.
A: Trojan
B:RootKit
C:Spyware
D:MITM
B:rootkit
what is the 4 things that DHCP gives you?
SUBNET MASK
DEFAULT GATEWAY
DNS IP
IP
What are the pin colors for TIA/EIA 568A?
SG,G,SO,B,SB,O,SBR,BR
What are all the Trouble shooting steps in ORDER
1:Identify the problem
2:establish a theory of Probable cause
3:Test the theory
4:Establish a plan of action and implement
5:Verify functionality
6:Document
what are all the standards IN ORDER regarding 802.11?
802.11a
802.11b
802.11g
802.11n
802.11ac
802.11ax
one of the most comprehensive data protection regulations with global implications. It empowers individuals by granting them greater control over their data in the Europe.
A:SOX
B:GDPR
C:GLBA
D:EPA
B:GDPR