Wireless Security
Workstation Security
Windows OS Basic Security Settings
macOS
Windows OS Troubleshooting
100

Which wireless encryption scheme offers the highest level of protection?

WPA3

100

What are the top two factors that are considered most important for creating strong passwords: 

Length and complexity

100

Which of the following answers refers to a built-in MS Windows account with complete and unrestricted system access?

Administrator

100

This single sign-on (SSO) solution is used to access all Apple services and products.

Apple ID

100

This error screen in Windows is accompanied by a QR code starting with Windows 8 and requires a system reboot.

Blue Screen of Death (BSoD)

200

Which of the cryptographic algorithms is the least vulnerable to attacks?

AES

200

This is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. A good countermeasure against shoulder surfing.

Privacy filter (a.k.a. privacy screen)

200

What is the name of a Microsoft Windows feature that enables encryption of entire drives?

Bitlocker

200

This feature in macOS allows users to create multiple, switchable desktop environments.

Spaces

200

The "pinwheel" term is an informal name for a stop error in this operating system.

macOS

300

An acronym that refers to a client authentication method used in WPA2 Personal mode?

Personal Shared Key (PSK)

300

An account policy setting that forces users to produce a new password every time they are required to change their old password is known as:

Password history

300

A Windows resource with conflicting NTFS and share permissions applied to it will assume:

The most restrictive permission

300

This macOS tool provides full-disk encryption to protect user data.

FileVault

300

These two steps can resolve booting to an incorrect device: disconnecting external drives and updating this setting in the BIOS:

Boot order

400

A centralized authentication, authorization, and accounting (AAA) networking protocol best used for remote access to securely authenticate users and devices before granting them access in wireless networks which primarily encrypts only the user password in the authentication process 

RADIUS

400

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

Maximum password age setting

400

This Microsoft OS security feature limits software privileges and prompts for admin approval or a password for system changes.  

User Account Control (UAC)

400

This macOS file extension represents a disk image containing an exact copy of a storage device.

.dmg

400

This command-line tool rebuilds the Boot Configuration Data when a "missing configuration data" error occurs.

bootrec /rebuildbcd

500

A centralized authentication, authorization, and accounting (AAA) networking protocol developed by Cisco, widely used in high-security environments. It provides granular control over user permissions by separating the AAA functions and encrypts the entire authentication packet for enhanced security.

TACACS+

500

An account management security measure that narrows down a user's computer access to specified hours is called what?

Login time restrictions

500

Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is called:

Encrypting File System (EFS)

500

This file type is used as an installer for macOS applications.

.pkg

500

This file is essential for the Windows boot process and might be corrupt or missing if booting fails.

NTLDR

M
e
n
u