Your fingerprint and your retina are examples of ______________.
What is Something You Are?
Someone spying on your computer screen while you are working is a technique known as ________.
What is shoulder surfing?
With any operating system, it is essential to keep the drivers and the __________ updated.
What is firmware?
In MacOS, this feature is used to make backups of various types.
What is Time Machine?
This is the most popular command line interface in Linux.
What is Bash (Bourne Again Shell)?
An access control vestibule is a form of _______________.
What is physical security?
This type of attack takes advantage of human shortcomings and vulnerabilities.
What is social engineering?
This is a term for a partial or full backup kept at the computer center for immediate recovery purposes.
What are shadow copies/working copies?
___________ is the Mac equivalent of the Windows “Start” menu.
What is Finder?
When it comes to managing files and their permissions in Linux, what do the letters r, w and x represent?
What is read, write and execute?
Many ID badges use _________ to allow or deny access into a facility or room.
What is RFID (radio frequency identification)?
This type of attack uses more than one computer to attack the victim.
What is a DDoS (distributed denial of service)?
This is an automated package installer file commonly used on Windows devices.
What is .PKG?
This is a file type that can be mounted as a disk on Macintosh operating systems.
What is .DMG (disk imaging file)?
Tell us what the first portion of this command is instructing us to do: “cd /usr/lib”.
What is change directory?
Requiring the use of symbols, case variation, numeric variation and a minimum number of characters is an example of a __________ policy.
What is Password Complexity?
This is an often malicious software program that has the ability to hide certain information from the operating system.
What is a rootkit?
___________ are used to control traffic and applications on a network.
What are Access Control Lists (ACL’s)?
This is the MacOS equivalent of Ctrl+Alt+Del on Windows.
What is Option+Command+Esc?
This Linux command allows you to display and configure information related to a wireless configuration.
What is iwconfig?
This security concept states that a user should be restricted to the fewest number of privileges that they need to do their job.
What is the Principle of Least Privilege?
This type of attack occurs when a threat agent enters a series of escape codes along with a well crafted code statement into a URL.
What is an SQL (Structured Query Language) injection?
This Active Directory component maps printers and drives during login.
What is Login script?
With Apple products, it is possible to scroll, tap, pinch and swipe to interact with the macOS or other products in a way that is intended to be natural and intuitive.
What are gestures?
These Linux commands enable you to download files from a repository site.
What are “yum” and “apt-get”?