Top Flight Security
Don't Get Caught Slippin'
Tech Talk
Return of the Mac
Red Hat Hacker
100

Your fingerprint and your retina are examples of ______________.

What is Something You Are?

100

Someone spying on your computer screen while you are working is a technique known as ________.    

What is shoulder surfing?

100

With any operating system, it is essential to keep the drivers and the __________ updated.

What is firmware?

100

In MacOS, this feature is used to make backups of various types.

What is Time Machine?

100

This is the most popular command line interface in Linux.

What is Bash (Bourne Again Shell)?

200

An access control vestibule is a form of _______________.

What is physical security?

200

This type of attack takes advantage of human shortcomings and vulnerabilities.

What is social engineering?

200

This is a term for a partial or full backup kept at the computer center for immediate recovery purposes.

What are shadow copies/working copies?

200

___________ is the Mac equivalent of the Windows “Start” menu.

What is Finder?

200

When it comes to managing files and their permissions in Linux, what do the letters r, w and x represent?

What is read, write and execute?

300

Many ID badges use _________ to allow or deny access into a facility or room.

What is RFID (radio frequency identification)?

300

This type of attack uses more than one computer to attack the victim.

What is a DDoS (distributed denial of service)?

300

This is an automated package installer file commonly used on Windows devices.

What is .PKG?

300

This is a file type that can be mounted as a disk on Macintosh operating systems.

What is .DMG (disk imaging file)?

300

Tell us what the first portion of this command is instructing us to do: “cd /usr/lib”.

What is change directory?

400

Requiring the use of symbols, case variation, numeric variation and a minimum number of characters is an example of a __________ policy.

What is Password Complexity?

400

This is an often malicious software program that has the ability to hide certain information from the operating system.

What is a rootkit?

400

___________ are used to control traffic and applications on a network.

What are Access Control Lists (ACL’s)?

400

This is the MacOS equivalent of Ctrl+Alt+Del on Windows.

What is Option+Command+Esc?

400

This Linux command allows you to display and configure information related to a wireless configuration.

What is iwconfig?

500

This security concept states that a user should be restricted to the fewest number of privileges that they need to do their job.

What is the Principle of Least Privilege?

500

This type of attack occurs when a threat agent enters a series of escape codes along with a well crafted code statement into a URL.

What is an SQL (Structured Query Language) injection?

500

This Active Directory component maps printers and drives during login.

What is Login script?

500

With Apple products, it is possible to scroll, tap, pinch and swipe to interact with the macOS or other products in a way that is intended to be natural and intuitive.

What are gestures?

500

These Linux commands enable you to download files from a repository site.

What are “yum” and “apt-get”?

M
e
n
u