×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

LOG IN TO YOUR ACCOUNT

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR PASSWORD?

AAH, WAIT, I REMEMBER NOW!

CREATE AN ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • INFO

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED
Questions and answers formulated by: Acácio Pereira Oliveira

Does Post-deployment Configuration involves configuration of a local server after Windows Server is installed?

Wednesday, 27 December 2023 by Acácio Pereira Oliveira

Post-deployment configuration in the context of Windows Server administration refers to the process of configuring a local server after the installation of the Windows Server operating system. This configuration is performed to optimize the server's performance, security, and functionality to meet the specific requirements of an organization or individual. After the initial installation of the

  • Published in Cybersecurity, EITC/IS/WSA Windows Server Administration, Working with Windows Server, Basic Windows Server configuration
Tagged under: Cybersecurity, Monitoring And Management Configuration, Network Configuration, Post-deployment Configuration, Remote Access Configuration, Security Configuration, Server Roles And Features, Storage Configuration, Windows Server

Does the broadcast IPv4 address for subnet mask 255.255.255.0 ends with .255?

Wednesday, 20 December 2023 by Acácio Pereira Oliveira

The broadcast IPv4 address for a subnet mask of 255.255.255.0 does indeed end with .255. To understand why, let's consider the concepts of subnet masks and broadcast addresses. In IPv4 networking, a subnet mask is a 32-bit value that is used to divide an IP address into network and host portions. The subnet mask consists

  • Published in Cybersecurity, EITC/IS/WSA Windows Server Administration, Configuring DHCP and DNS Zones in Windows Server, DHCP scopes and exclusions
Tagged under: Broadcast Address, Cybersecurity, Host Portion, IP Addressing, Network Portion, Subnet Masks

Is the network layer of the OSI model responsible for routing and network addressing and does it feature packets of data?

Tuesday, 19 December 2023 by Acácio Pereira Oliveira

The Network layer of the OSI (Open Systems Interconnection) model plays a important role in the process of routing and network addressing, as well as handling packets of data. This layer, also known as Layer 3, is responsible for establishing end-to-end connections between network devices, ensuring that data is efficiently transmitted across networks. By understanding

  • Published in Cybersecurity, EITC/IS/CNF Computer Networking Fundamentals, OSI Model, Introduction to the OSI Model
Tagged under: Cybersecurity, Data Packets, Network Addressing, Network Layer, OSI Model, Routing

Is it true that a computer can only have a single MAC address?

Tuesday, 19 December 2023 by Acácio Pereira Oliveira

In the field of computer networking, it is a commonly held belief that a computer can only have a single MAC address. However, this statement is not accurate. To understand why, it is essential to consider the concept of MAC addresses and their role in networking. MAC, which stands for Media Access Control, is a

  • Published in Cybersecurity, EITC/IS/CNF Computer Networking Fundamentals, Introduction, Introduction to networking
Tagged under: Computer Networking, Cybersecurity, MAC Address, Media Access Control, Network Interface Controller, Virtualization

Are SC fiber optics connectors gradually replacing the LC connectors?

Tuesday, 19 December 2023 by Acácio Pereira Oliveira

SC (Subscriber Connector) and LC (Lucent Connector) are two commonly used fiber optic connectors in computer networking. While both connectors serve the same purpose of providing a reliable and efficient connection between fiber optic cables, they have some differences in terms of design, performance, and applications. The SC connector, which was developed by NTT (Nippon

  • Published in Cybersecurity, EITC/IS/CNF Computer Networking Fundamentals, Physical networks, Cabling devices
Tagged under: Cabling Devices, Computer Networking, Cybersecurity, Fiber Optic Cables, LC Connectors, Lucent Connector, Physical Networks, SC Fiber Optic Connectors, Subscriber Connector

Is the DNS CNAME record the one that needs to change its values if the domain name mapping to an IP address is changed?

Tuesday, 19 December 2023 by Acácio Pereira Oliveira

The DNS CNAME (Canonical Name) record is an essential component of the Domain Name System (DNS) that allows domain names to be mapped to their corresponding IP addresses. When the IP address associated with a domain name changes, it is necessary to update the values of the CNAME records to ensure proper functioning of the

  • Published in Cybersecurity, EITC/IS/CNF Computer Networking Fundamentals, Domain Name System, Introduction to DNS
Tagged under: CNAME Records, Cybersecurity, DNS, DNS Resolution, IP Address Mapping, Network Services

What are the disadvantages of the DNS CNAME record?

Tuesday, 19 December 2023 by Acácio Pereira Oliveira

The DNS (Domain Name System) is a critical component of computer networking that translates human-readable domain names into IP addresses. It plays a important role in establishing connections between devices on the internet. DNS CNAME (Canonical Name) records are a type of DNS record that allows one domain name to be an alias for another

  • Published in Cybersecurity, EITC/IS/CNF Computer Networking Fundamentals, Domain Name System, Introduction to DNS
Tagged under: CNAME Records, Cybersecurity, DNS, DNS Dependencies, DNS Hijacking, DNS Resolution Time, DNS Spoofing, Troubleshooting

Does the bend radius for optical fiber cables specifies how much the cable can be coiled before the attenuation degrades the signal?

Tuesday, 19 December 2023 by Acácio Pereira Oliveira

The bend radius for optical fiber cables plays a important role in maintaining the integrity of the signal being transmitted. It specifies the maximum allowable curvature that the cable can endure without degrading the signal quality. When a cable is bent beyond its specified bend radius, the attenuation of the signal increases, resulting in a

  • Published in Cybersecurity, EITC/IS/CNF Computer Networking Fundamentals, Physical networks, Cabling devices
Tagged under: Attenuation, Bend Radius, Bending Losses, Cybersecurity, Optical Fiber Cables, Signal Integrity

In classful addressing each class C network in the IPv4 space can have up to 255 hosts.

Tuesday, 19 December 2023 by Acácio Pereira Oliveira

In classful addressing, each Class C network in the IPv4 space can have up to 255 hosts. This statement refers to the traditional method of IP addressing, which was widely used before the introduction of Classless Inter-Domain Routing (CIDR). To understand this concept, let's consider the details of classful addressing and how it relates to

  • Published in Cybersecurity, EITC/IS/CNF Computer Networking Fundamentals, Internet protocols, IP addressing in depth
Tagged under: CIDR, Class C Network, Classful Addressing, Cybersecurity, IP Addressing, IPv4

Does each network device (e.g. a network card) must have a unique MAC address?

Tuesday, 19 December 2023 by Acácio Pereira Oliveira

Each network device, such as a network card, must have a unique Media Access Control (MAC) address. This requirement is essential in computer networking to ensure the proper functioning and identification of devices within a network. The MAC address serves as a unique identifier for each network interface card (NIC) or network adapter. A MAC

  • Published in Cybersecurity, EITC/IS/CNF Computer Networking Fundamentals, Introduction, Introduction to networking
Tagged under: Computer Networking, Cybersecurity, MAC Address, Network Communication, Network Device, Network Security
  • 1
  • 2
  • 3
  • 4
Home » Acácio Pereira Oliveira

Certification Center

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (105)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Medium publ.)
  • About
  • Contact

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.

Eligibility for EITCA Academy 80% EITCI DSJC Subsidy support

80% of EITCA Academy fees subsidized in enrolment by

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on X
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF) in series of projects since 2007, currently governed by the European IT Certification Institute (EITCI) since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    EITCA Academy
    • EITCA Academy on social media
    EITCA Academy


    © 2008-2025  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    CHAT WITH SUPPORT
    Do you have any questions?