1/68
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is the function of PCIe slots?
Connect expansion cards like GPUs

What is another name for an RJ45 port used for a wired network connection?
Ethernet
What does POST stand for in the boot process?
Power On Self Test

Which of the following is the correct order during system startup?
BIOS POST Boot loader OS
What does CMOS store?
System settings like date, time, and boot order
What is the role of the BIOS during startup?
Run POST and locate the boot device

What is the main function of the CPU in a computer?
Perform calculations and run programs

What is the purpose of RAM in a computer?
Store temporary data for active processes

What is the main purpose of a GPU?
Render graphics

What differentiates a GPU from a CPU?
GPUs specialize in lots of parallel processing for visual output
What does an operating system (OS) primarily do?
Manage and allocate hardware and software resources

What is the role of the kernel in an OS?
Directly manage hardware resources

What does a driver do in a computing system?
Translates between the OS and hardware devices

Which scenario best illustrates the role of a driver?
Printer driver converts document into hardware-specific command
What is a common misconception?
The web and the internet are the same thing

What phrase is used to help define the term "Internet"?
International Network
What is a good analogy for data packets on the internet?
Postcards
What is the function of an IP address?
Uniquely identify a device on a network

What service translates domain names like "google.com" into IP addresses?
DNS
What extra security feature does HTTPS provide over HTTP?
Encrypted communication
What risk is highlighted when using HTTP instead of HTTPS?
Data packet sniffing of unencrypted www info in transit on a network
What does cybersecurity primarily aim to protect?
Networks, devices, and data from unauthorized access
What is a core principle of data privacy?
Entities must control access to their data

 (NOT Data must be made public
)
Which of the following best defines "Security" in computing?
Having controls in place to limit unauthorized data access
How does privacy relate to security?
Privacy is the goal; security is the method

Which of the following is an example of encoding?
Transforming data to hexadecimal format

What distinguishes encryption from encoding?
Encryption hides keys

What distinguishes encryption from hashing?
Encryption can be reversed

What is a hash most often used for?
Uniquely identifying data without knowing the original
In cybersecurity, what does the 'C' in C.I.A. stand for?
Confidentiality
Which principle ensures data hasn’t been changed unexpectedly?
Integrity
Which of the following supports the Availability principle?
Real time access to systems and data

What does "Least Privilege" mean?
Users only get access needed for their tasks
What is "Implicit Deny"?
Denying all users by default unless specifically allowed

What’s one way to ensure integrity in communications?
Use digital signatures to prove sender/receiver are who they say they are
What is Information Assurance (IA)?
Measures to ensure CIA of information
Which of the following is NOT part of the CIA Triad but is part of IA?
Non-repudiation
"Something you know" refers to which type of authentication?
Password
What does non-repudiation ensure?
That senders and receivers can’t deny sending/receiving

What is the main purpose of CVE identifiers?
Uniquely identify vulnerabilities
What is an attack vector?
The method used to breach systems
Which attack sends generic messages to many recipients?
Phishing
What distinguishes spear-phishing from phishing?
It targets specific individuals

What is spoofing?
Faking identity in digital communication
What does DNS spoofing do?
Redirects you to a fake website, even if you type in the correct URL
What is a common tool used in MitM attacks?
Wireshark
What’s a key feature of a DoS attack? (NOT DDoS.)
One computer floods a system
What defines a botnet?
Network of infected machines

What does a keylogger do?
Logs all keystrokes
What is the primary difference between a virus and a worm?
Worms self propagate without user action

What is a zero-day exploit?
An unknown flaw used before a fix exists
What does XSS do?
Injects malicious code into legitimate websites

What does XSS stand for?
Cross Site Scripting

What does SQL Injection target?
Databases
What is a buffer overflow?
Writing more data than memory can hold

What is a Pass-the-Hash attack?
Using stolen hashed credentials
What is the purpose of a rainbow table?
Listing hashes of passwords using precomputed data

What is session replay?
Capturing and replaying user actions

What is brute force password cracking?
Guessing passwords by trying every combination
What’s a hybrid attack?
Dictionary attack plus symbols and numbers
What is the primary function of a switch in a network?
Forwards data only to the intended recipient device within the same network

Which device is responsible for providing access to the internet by translating digital signals to analog and vice versa?
Modem
What does a router do in a home or office network?
Routes traffic between networks and assigns IP addresses
A gateway is best described as:
A device that connects two different protocols or networks
In a typical home setup, which device usually has built-in switch, router, and modem functionalities?
All in one wireless router/modem
Which device uses MAC addresses to forward data?
Switch
If your ISP provides a public IP address, which device in your home network receives it directly (unless bridged)?
Modem
You need to connect 10 computers in a local office so they can share files. Which device should you use?
Switch
Which of the following devices can function as a firewall or perform NAT (Network Address Translation)?
Router