This command let's you send out an ICMP packet to see if it returns back to you and confirms who you contacted is online.
What is ping
This addition to a command is used to elevate permissions to an administrator level, but only for that command
What is Super User Do? (What is sudo)
This type of attack tries every possible password until it finds the right one.
What is a Brute Force?
This Windows program allows you to see all connected hardware to the system, and if that hardware is operational, disabled, or needs troubleshooting
What is Device Manager?
This basic tool should be worn, with direct connection to your skin in order to minimize the risk of component damage when you open the case of a computer
What is an Electrostatic Discharge Strap? (ESD)
This command will list your IP Address, and can also renew, release or flush the DNS Resolver Cache.
What is ipconfig?
What is pwd?
This kind of attack can be defeated by the use of Bollards. (Or Target's big red balls)
What is a ramming attack?
This is the Windows program that lets you view, start, stop or restart any active services on your system
What is Services Console? (Or Services.msc)
This laptop monitor part translates lower DC Voltage to higher DC voltage to power the LCD Backlight, and should be handled carefully
What is an inverter?
This command is useful for mapping the steps your computer takes to contact another computer or website
What is tracert? (Or Traceroute)
This command will allow you to switch users inside of the Terminal shell
What is su?
This type of attack can use dumpster diving, vishing phone calls, pretending to be law enforcement or other members of the company, scareware webpages, phising, spear phishing or whaling, or baiting to gain access.
What is Social Engineering?
This program within the Microsoft Management Console can allow you to read the logs Windows generates as normal operations.
What is the Event Viewer?
This Hardware part of a computer can contain the largest electrical hazard to the user
What is a Power Supply Unit (PSU)?
This command lets you update and enforce the Group Policy rules from your Active Directory/Azure network to your computer
What is gpupdate?
This command will let you modify the permissions for an individual file or a full folder
What is chmod?
This type of attack uses a custom Access Point programmed with the SSID of a legitimate business nearby to capture and redirect internet traffic
What is an evil twin?
This Windows program can show you more detailed information about the System resource use than Task Manager.
What is Resource Monitor?
This type of container is what hardware components are stored in until the user is ready to install them.
What is an anti-static bag?
This command allows you to see the current active, in wait, and recently terminated connections to other IP Addresses.
What is netstat?
This Command will let you change the ownership of a Linux file
What is chown?
This type of attack can be defeated with a "man-trap"
What is tailgating?
This program can let you edit the "system map" of Windows, but only should be used with instructions or if you're well practiced in it.
What is Regedit? (Or Regedit.exe, Registry Editor)
This type of appliance can safely remove dust the interior of a computer without risk to the components
What is a computer vacuum?