Social Engineering Risks
Backup Strategies
Mobile OS & Application Troubleshooting
Control Panel Utilities
Script File Types (dot what?)
100

Having the documents shredded or incinerated before disposal makes this physical security threat less effective and mitigates the risk of social engineering attacks.

Dumpster diving

100

A company utilizes a backup rotation scheme where backups performed daily during a week are used to create a weekly backup and backups created at the end of each week are used to create a monthly backup. The answer that refers to this backup rotation scheme should feel familiar... 

Grandfather-Father-Son

100

The most common troubleshooting step used to solve mobile OS and application issues?

Retarting the phone

100

Identify what control panel applet is referred to by the following attributes

  • Win+R then type "firewall.cpl"
  • Ability to control incoming and outgoing network traffic
  • Applies different security settings depending on the network type (public, private, or domain)
  • Ability to specify which programs are allowed to access the network.   

Windows Defender Firewall

100

Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language.

.vbs

200

The practice of using a telephone system to manipulate user into disclosing confidential information is known as:

Vishing

200

The characteristics listed below can be used to describe this strategy:

  • Keep at least 1 backup copy offsite
  • Create 1 primary backup file
  • Save backups to 2 different storage media types
  • Create 2 copies of the primary backup file 

3-2-1 backup

200

The process of removing software restrictions imposed by Apple on its iOS operating system?

Jailbreaking

200

Identify what control panel applet is referred to by the following attributes

  • Win+R then type "control.exe"
  • Allows to add/remove wired and wireless devices 
  • Provides a simplified view of all connected devices 
  • Allows to troubleshoot a device that isn't working properly

Devices and Printers

200

A type of script filename extension that would be used to create a script file that extends the scope of interaction between a user and a web page?

.js

300

Phishing scams targeting people holding high positions in an organization or business are known as:

Whaling

300

An up-to-date full backup copy that combines the last full backup with subsequent incremental and/or differential backups is referred to as:

Synthetic full backup copy

300

What is the name of an iOS/Android feature that provides access to advanced system settings hidden by default from regular users?

Developer Mode
300

Identify what control panel applet is referred to by the following attributes

  • Win+R then type "appwiz.cpl"
  • Uninstalling applications
  • Conducting repair installation of a malfunctioning program
  • Adding/removing Windows components
  • Managing installed updates

Programs and Features

300

Which of the answers listed below refers to the filename extension of a Microsoft PowerShell script file?

.ps1

400

Gaining unauthorized access to restricted areas by following another person

Tailgating

400

This back up strategy requires a working copy of the last full backup and the most recent copy of the incremental backup.

Differential backup strategy

400

The process of granting regular users elevated privileges on an Android-based mobile device is called:

Rooting

400

Identify what control panel applet is referred to by the following attributes:

  • Win+R then type "control.exe /name microsoft.networkandsharingcenter"
  • View active networks
  • Set up a new connection or network
  • Troubleshoot network problems

Network and Sharing Center

400

Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2, and Microsoft Windows?

.bat

500

A rogue Wireless Access Point set up for eavesdropping or stealing sensitive user data which replaces the legitimate access point and by advertising its own presence with the same SSID.

Evil Twin

500

A backup strategy that requires all copies of backups made since the last full backup, along with the last full backup itself, is called what?

Incremental backup

500

A package file format used by Android OS for distribution and installation of mobile apps is known as:

apk

500

Identify what control panel applet is referred to by the following attributes:

  • Win+R then type "control.exe /name microsoft.system"
  • Provides access to basic information about a PC running Microsoft Windows OS (RAM, CPU, OS version)
  • Enables quick access to other related system utilities and settings

System Control Panel

500

Which of the following answers refers to a script file type designed to be run in Unix command line?

.sh

M
e
n
u