This Windows program allows you to see all connected hardware to the system, and if that hardware is operational, disabled, or needs troubleshooting
What is Device Manager
This command let's you send out an ICMP packet to see if it returns back to you and confirms who you contacted is online
What is Ping?
This addition to a command is used to elevate permissions to an administrator level, but only for that command
What is sudo?
This is where MacOS stores the most commonly used applications, those currently open, and the Finder Application
What is the Dock?
This type of attack tries every possible password until it finds the right one
What is a Brute Force?
This program within the Microsoft Management Console can allow you to read the logs Windows generates as normal operations
What is the Event Viewer?
This command will list your IP Address, and can also renew, release or flush the DNS Resolver Cache
What is ipconfig?
This Command will tell you your current location
What is pwd?
This function is how you can "End Task" on an unresponsive program in MacOS
What is Force Quit?
A vulnerability that is exploited before the developer knows about it or can release a patch
What is a Zero-Day?
This program can let you edit the "system map" of Windows, but only should be used with instructions or if you're well practiced in it
What is Registry Editor
This command is useful for mapping the steps your computer takes to contact another computer or website
What is tracert?
This command will allow you to switch users inside of the Terminal shell
What is su?
This program is often considered Mac's answer to the Windows Control Panel
What is System Preferences?
This type of attack can use dumpster diving, vishing phone calls, pretending to be law enforcement or other members of the company, scareware webpages, phising, spear phishing or whaling, or baiting to gain access
What is Social Engineering?
This Windows program can show you more detailed information about system resource use than Task Manager
What is Resource Monitor?
This command lets you update and enforce the Group Policy rules from your Active Directory/Azure network to your computer
What is gpupdate?
This command will let you modify the permissions for an individual file or a full folder
What is chmod?
This is the MacOS version of Task Manager
What is Activity Monitor?
his type of attack uses a custom Access Point programmed with the SSID of a legitimate business nearby to capture and redirect internet traffic
What is an Evil Twin?
This is the Windows program that lets you view, start, stop or restart any active services on your system
What is Services Manager?
What is netstat
This Command will let you change the ownership of a Linux file
What is chown?
What is HFS+?
An attack launched from multiple compromised systems referred to as a botnet and causes a service at a given host to fail or to become unavailable to legitimate users
What is a Distributed Denial of Service?