OS Types/ Editions
Management Consoles
Windows User/System settings
Attacks-threats-vulnerabilities
Windows Networking/ settings
100

This lightweight operating system is primarily designed for web-based applications and cloud computing.

What is Chrome OS

100

This Windows utility allows users to view and manage hardware devices, drivers, and system settings.

What is Device Manager

100

In Windows, users can access a centralized area called this, where they can find settings and tools to enhance accessibility features.

What is Ease of Access Center?

100

This term refers to a software vulnerability that is exploited by cyber attackers before the software vendor becomes aware of it and releases a patch.

What is a zero-day

100

This term refers to the name of a wireless network that users select to connect their devices, often seen when browsing available Wi-Fi networks.

What is an SSID

200

In the context of software support, this term refers to the point at which a product is no longer supported by its manufacturer, leading to discontinued updates and security patches.

What is EOL

200

This Windows utility allows users to manage disk drives and partitions on their computer system.

What is Disk Management (diskmgmt.msc)?

200

In Windows, users can manage account settings such as passwords, user permissions, and login options using this control panel applet.

What is User Accounts (Control Panel)?

200

This foundational concept in information security, often encompasses the principles of ensuring data confidentiality, data integrity, and system availability.

What is the CIA triad

200

This built-in Windows security feature controls incoming and outgoing network traffic, providing protection against unauthorized access and malicious software.

What is Windows Defender Firewall

300

This file system, developed by Apple Inc., is optimized for use with solid-state drives (SSDs) and offers features such as native encryption and improved space efficiency.

What is APFS (Apple File System)

300

To view system logs in Windows, users can access this utility, which records events and errors related to the operating system and applications.

What is Event Viewer

300

In Windows, users can manage files, folders, and drives using this graphical user interface tool.

What is File Explorer?

300

This social engineering technique involves creating a fabricated scenario to trick individuals into disclosing confidential information or performing actions they wouldn't normally do.

What is pretexting

300

This network utility measures the round-trip time for data to travel from one computer to another on a network, often used to diagnose connection issues.

What is Ping

500

This file system, known for its compatibility with various operating systems and devices, supports file sizes up to 4 GB.

What is FAT32

500

To view current resource allocations such as CPU usage, memory usage, and network activity in Windows, users can access this built-in utility.

What is Task Manager

500

In Windows 10, users can access settings for Display, Sound, and Notifications by navigating to this centralized area.

What is Settings (Windows Settings)?

500

Identified as a clandestine wireless access point that infiltrates corporate networks, this term epitomizes the dangers of unapproved IT deployments.

What is a spoofed AP (access point)

500

This command-line tool traces the path that data packets take from one computer to another over a network, revealing the route and transit times between nodes.

What is tracert

1000

This Microsoft feature provides full disk encryption to help protect data on Windows-based computers.

What is BitLocker

1000

This command-line utility in Windows allows users to copy files and directories while preserving their attributes and permissions.

What is xcopy

1000

To optimize the performance of hard disk drives in Windows, users can use this utility to rearrange fragmented data.

What is Disk Defragmenter?

1000

This malicious cyberattack floods a server or network with an overwhelming volume of requests, rendering it inaccessible to legitimate users.

What is a DDos?

1000

In Windows environments, these administrative tools centralize and manage user and computer configurations across a network, ensuring consistent security and operational settings.

What is GPOs (Group Policy Objects)

M
e
n
u