A+ Hardware
Fundamentals
Operating Systems (A+)
Network+ Networking Basics
Security+ Threats and Attacks
Security+ Tools & Concepts
100

This component is considered the "brain" of the computer.

What is the CPU?

100

The file system used by Windows 10 and 11.

What is NTFS?

100

This device connects multiple computers within the same LAN and uses MAC addresses to forward data.

What is a switch?

100

This type of attack floods a network with traffic to overwhelm systems.

What is a DDoS attack?

100

This type of firewall filters traffic based on port and protocol.

What is a packet-filtering firewall?

200

This type of memory is volatile and is cleared when the computer powers off.

What is a RAM?

200

This command-line tool is used in Windows to check for and repair disk errors.

What is CHKDSK?

200

This unique identifier is assigned to every network interface card (NIC).

What is a MAC address?

200

Software designed to damage or disrupt systems is collectively known as this.

What is malware?

200

This process transforms readable data into unreadable code.

What is encryption?

300

SATA, M.2, and NVMe are interfaces used by these devices.

What are storage drives (SSDs/HDDs)?

300

This type of account in Windows has unrestricted access to system settings.

What is the Administrator account?

300

The protocol responsible for translating domain names into IP addresses.

What is DNS?

300

A type of phishing that targets specific individuals or organizations.

What is spear phishing?

300

This tool scans for vulnerabilities or misconfigurations in networks.

What is a vulnerability scanner?

400

This device converts AC power from the wall to DC power for the computer.

What is a power supply unit (PSU)?

400

This Windows utility allows users to view and end running processes.

What is Task Manager?

400

This is the process of assigning IP addresses automatically.

What is DHCP?

400

A security concept that limits user access to only what is necessary.

What is the principle of least privilege?

400

A cryptographic hash function commonly used to verify file integrity.

What is SHA-256?

500

This firmware interface replaced BIOS in modern systems.

What is UEFI?

500

This Linux command is used to change file permissions.

What is chmod?

500

This IEEE standard defines wireless networking.

What is 802.11?

500

This attack intercepts and potentially alters communication between two parties.

What is a man-in-the-middle attack?

500

The 3 key components of the CIA Triad in cybersecurity

What are Confidentiality, Integrity, and Availability?