Where would you navigate to on a Windows pc to uninstall an application?
Apps
What authentication process and encryption method does WPA2 use?
Radius/AES
Which command in a Linux environment is used to display the full path to the current directory?
pwd
What command is used to find the path of a packet through the network using a Windows 10 home pc?
Tracert
You're troubleshooting a remote desktop connectivity issue. Which port must be open for RDP to function, and how would you verify that it is accessible from another networked machine?
RDP port 3389, tools like nmap and telnet
What OS is on an apple iPhone?
iOS
What type of malware causes processes to run without being seen by task manager and a netstat scan?
Rootkit
What Windows service should be disabled prior to cleaning an infection?
system restore
Which tool allows you to see what process or application is using the most system resources?
Task Manager
Ports 67 communications between client and servers and 68 for client responses
What file system type is used when running a Linux machine?
ext3/4
What type of social engineering is used during a phone call?
Vishing
What is the 3rd step in malware removal?
Disable system restore in windows
What tool tracks all events on a Windows computer?
Event Viewer
A user is experiencing slow file transfers using FTP. Identify the ports that FTP uses for data transfer and control communication. How would switching to SFTP improve security, and what port does SFTP use?
FTP uses port 21 for control communication, port 20 for data transfer, and SFTP uses port 22
You're office needs you to install Windows on a workstation from an image in the server. What do you need to do to the workstation in order to support this type of OS installation?
PXE boot
What type of attack happens prior to any patches or fixes can occur?
Zero Day
What is the first thing to check if a system performance is sluggish?
malware
What command line interface tool is used for a Linux environment?
Shell
What is the default port for LDAP?
Port 389
Bob wants to know what type of Windows is on his pc. What command is used to find this information?
winver
What is the process of masquerading as another user or device?
Spoofing
A Windows user has noticed that their files are missing. They want to know who the last person was to log into their pc. What Event Viewer log file can you look at to find out who the last person to log on the pc?
Security
What is used on a Mac to stop an unresponsive application?
Force Quit
Which port does HTTPS rely on for a secure communication, and what encryption protocol ensures its security?
HTTPS uses port 443, and its security is ensured by TLS