Hardware
Networking
Operating Systems
Sys Admin
Security
100

The most common connector type used to connect an external monitor to a modern laptop or desktop computer.

What is HDMI (High-Definition Multimedia Interface) or DisplayPort?

100

This standard networking model divides communication into seven distinct layers, unlike the simpler five-layer model.

What is the OSI Model (Open Systems Interconnection Model)?

100

The command-line utility in both Windows and Linux used to display a list of currently running programs and their process IDs.

What is Task Manager (Windows) or top/ps (Linux)?

100

A central repository of user, group, and computer accounts that is used by network administrators for centralized access control and management.

What is a Directory Service (like Active Directory or LDAP)?

100

A type of software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

What is malware?

200

This firmware interface replaces the older BIOS and provides a graphical setup screen and better support for larger hard drives.

What is UEFI (Unified Extensible Firmware Interface)?

200

The network protocol that automatically assigns an IP address, subnet mask, and other network configuration details to a device.

What is DHCP (Dynamic Host Configuration Protocol)?

200

In Linux, this command is used to change the owner and group of a file or directory.

What is chown?

200

The process of creating a complete copy of an organization's critical data to be used in the event of data loss.

What is Backup?

200

This principle of security is represented by the "A" in the Triad  

What is Availability?

300

When a computer's power supply unit fails, the system might not even reach this critical component check upon startup.

What is the POST (Power-On Self-Test)?

300

This utility is used to determine the path (route) a data packet takes from your computer to a destination on a network, showing each router (hop) along the way.

What is traceroute (or tracert)?

300

The type of software that allows a single physical computer to host multiple virtual operating systems simultaneously.

What is a Hypervisor?

300

This is a cloud computing service model that allows a customer to rent computing resources like virtual machines, storage, and networks.

What is IaaS (Infrastructure as a Service)?

300

A technique used to prevent an attacker from finding out what a network's private IP addresses are by translating them into one or more public IP addresses.

What is Network Address Translation (NAT)?

400

This type of physical storage uses rapidly spinning magnetic platters to store data and is generally slower than an SSD.

What is an HDD (Hard Disk Drive)?

400

The layer in the TCP/IP model that includes protocols like TCP and UDP, responsible for making connections and transporting data between applications.

What is the Transport Layer?

400

The initial program that the computer BIOS or UEFI loads when a system starts up, responsible for loading the operating system kernel.

What is the Bootloader?

400

A command-line utility often used in Windows Server environments for scripting administrative tasks.

What is PowerShell?

400

This cryptographic tool is primarily used to ensure data confidentiality in transit by scrambling the contents of a message.

What is Encryption?

500

A condition where a processor runs faster than the manufacturer's specified clock speed, often done by enthusiasts, but can lead to instability or overheating.

What is Overclocking?

500

A networking device that primarily operates at Layer 2 (Data Link) of the OSI model and uses MAC addresses to forward frames only to the port where the destination device is connected.

What is a Switch?

500

This specific Linux command is used to permanently change the permissions of a file using octal (numeric) values, such as 755 or 644.

What is chmod?

500

In the context of disaster recovery, the measurement of the acceptable time frame for restoring a system after a failure, often measured in minutes or hours.

What is RTO (Recovery Time Objective)?

500

This non-repudiation technique confirms the sender's identity and verifies that a message has not been altered since it was sent, using a mathematical hash and encryption.

What is a Digital Signature?