This lightweight operating system is primarily designed for web-based applications and cloud computing.
What is Chrome OS
This Windows utility allows users to view and manage hardware devices, drivers, and system settings.
What is Device Manager
In Windows, users can access a centralized area called this, where they can find settings and tools to enhance accessibility features.
What is Ease of Access Center?
This term refers to a software vulnerability that is exploited by cyber attackers before the software vendor becomes aware of it and releases a patch.
What is a zero-day
This term refers to the name of a wireless network that users select to connect their devices, often seen when browsing available Wi-Fi networks.
What is an SSID
In the context of software support, this term refers to the point at which a product is no longer supported by its manufacturer, leading to discontinued updates and security patches.
What is EOL
This Windows utility allows users to manage disk drives and partitions on their computer system.
What is Disk Management (diskmgmt.msc)?
In Windows, users can manage account settings such as passwords, user permissions, and login options using this control panel applet.
What is User Accounts (Control Panel)?
This foundational concept in information security, often encompasses the principles of ensuring data confidentiality, data integrity, and system availability.
What is the CIA triad
This built-in Windows security feature controls incoming and outgoing network traffic, providing protection against unauthorized access and malicious software.
What is Windows Defender Firewall
This file system, developed by Apple Inc., is optimized for use with solid-state drives (SSDs) and offers features such as native encryption and improved space efficiency.
What is APFS (Apple File System)
To view system logs in Windows, users can access this utility, which records events and errors related to the operating system and applications.
What is Event Viewer
In Windows, users can manage files, folders, and drives using this graphical user interface tool.
What is File Explorer?
This social engineering technique involves creating a fabricated scenario to trick individuals into disclosing confidential information or performing actions they wouldn't normally do.
What is pretexting
This network utility measures the round-trip time for data to travel from one computer to another on a network, often used to diagnose connection issues.
What is Ping
This file system, known for its compatibility with various operating systems and devices, supports file sizes up to 4 GB.
What is FAT32
To view current resource allocations such as CPU usage, memory usage, and network activity in Windows, users can access this built-in utility.
What is Task Manager
In Windows 10, users can access settings for Display, Sound, and Notifications by navigating to this centralized area.
What is Settings (Windows Settings)?
Identified as a clandestine wireless access point that infiltrates corporate networks, this term epitomizes the dangers of unapproved IT deployments.
What is a spoofed AP (access point)
This command-line tool traces the path that data packets take from one computer to another over a network, revealing the route and transit times between nodes.
What is tracert
This Microsoft feature provides full disk encryption to help protect data on Windows-based computers.
What is BitLocker
This command-line utility in Windows allows users to copy files and directories while preserving their attributes and permissions.
What is xcopy
To optimize the performance of hard disk drives in Windows, users can use this utility to rearrange fragmented data.
What is Disk Defragmenter?
This malicious cyberattack floods a server or network with an overwhelming volume of requests, rendering it inaccessible to legitimate users.
What is a DDos?
In Windows environments, these administrative tools centralize and manage user and computer configurations across a network, ensuring consistent security and operational settings.
What is GPOs (Group Policy Objects)