This open-source operating system often uses a package manager like dnf or yum for software installation.
What is Red Hat based Distrobutions
This basic security measure verifies a user's identity at the point of entry of a system.
What is Authentication?
You replaced a laptop’s hard drive, but it's not recognized by the system. What should be checked next?
what is the power and data cable connections?
This documentation is used to track the lifecycle, repair history, and configuration of company equipment.
What is asset management?
You need to check system file integrity and automatically replace corrupted files. This command helps.
What is sfc /scannow?
On macOS, this utility located in /Applications/Utilities allows users to manage volumes.
What is Disk Utility?
A form of malware that installs itself deep in an operating system and can often appear to be an operating system file.
What is a root kit?
A user reports slow performance only when opening large Excel files on the network. What is most likely the cause?
What is slow network performance?
This procedure outlines how to handle confidential customer data in compliance with legal and regulatory standards.
What is a data privacy policies?
After a failed boot, this command repairs the BCD (Boot Configuration Data) store to restore system startup functionality.
What is bootrec /rebuildbcd?
In Linux, this command is used to change file permissions and is critical for securing system files.
What is chmod?
This security protocol encrypts communications over wireless networks, and its often paired with AES
What is WPA2?
You have just completed an in-place Windows OS upgrade, but now the end user reports the network printer prints garbled output. What’s the most likely cause?
What is an outdated printer driver?
A technician must dispose of a hard drive containing sensitive client data. What’s the most secure method recommended?
What is physical destruction or degaussing?
This command displays detailed information about the system configuration, including hardware, OS build, and environment variables.
What is systeminfo?
This macOS feature allows users to run multiple virtual desktops and quickly switch between them, enhancing productivity.
What is Mission Control?
These two security principles aim to minimize the number of users with access and reduce attack surfaces.
What are least privilege and access control?
After installing a new graphics card, the system powers on but doesn’t display output. POST beeps indicate no display. What’s next?
What is reseating the card or verifying correct power connections?
To prevent unauthorized software installation, this policy is often enforced through Active Directory Group Policy settings.
What is a software restriction policy?
You need to forcefully terminate a misbehaving application using its process ID (PID) from the CLI. This command does the job.
What is taskkill /PID [number] /F?
In Linux, this system initialization process has largely replaced older methods like SysVinit and manages services and daemons.
What is Systemd?
This type of attack intercepts communication between two parties without their knowledge, often using spoofing.
What is a man-in-the-middle attack?
A virtual machine freezes intermittently on a host with several VMs running at the same time. What system resources should be checked?
What is available RAM or CPU load on the host machine?
You’re performing a forensic analysis on a compromised workstation. What ensures evidence remains intact and admissible in court?
What is chain of custody?
To map a network drive persistently via command line, you’d use this utility followed by specific drive and path parameters.
What is net use [drive:] [\server\share] /persistent:yes?