Virtual Box, VMWare, and Parallels are examples of this type of hypervisor that are installed on top of an existing host OS.
What is Type 2 (Host-based hypervisor)?
This refers to techniques that persuade or intimidate people into revealing this kind of confidential information or allowing some sort of access to the organization that should not have been authorized.
What is Social Engineering?
On macOS, this feature allows for the quick restoration of the entire system to a previous state, using external or network drives.
What is Time Machine?
This networking tool is used to test the latency and reachability of a host across an IP network by sending ICMP Echo Request packets.
What is Ping?
If a laptop screen shows a faint image but appears extremely dark, this component, responsible for illuminating the LCD panel, has most likely failed.
What is the inverter (or backlight)?
This uses VMs to provision corporate desktops, replacing traditional desktop computers with low-spec thin clients that connect to the VM using a remote desktop protocol.
What is Virtual Desktop Infrastructure (VDI)?
This attack uses a rogue wireless access point to try to harvest credentials.
What is an evil twin?
In a Linux terminal, this command is used to change the owner and group of a file.
What is chown?
This standard protocol dynamically assigns IP addresses, Subnet Masks, and Default Gateway information to devices on a network.
What is DHCP (Dynamic Host Configuration Protocol)?
A technician can use this firmware interface to check on-board sensor data, such as CPU temperature and fan speeds, without booting into the operating system.
What is the BIOS/UEFI?
This provides a development environment that includes infrastructure like servers and storage, but also offers tools for building, testing, and deploying applications.
This disk encryption product is available with all editions of Windows except for the Home edition.
What is Bitlocker?
In macOS, the default file extension for a disk image is used for distributing software and applications.
What is .dmg (Disk Image)?
This network device is smarter than a hub, operates at Layer 2 of the OSI model, and forwards data only to the specific destination port by using the recipient's MAC address.
What is a switch?
This distinctive, audible symptom from a mechanical hard drive usually signals an imminent failure, often related to the read/write heads.
What is a clicking (or grinding) noise?
This delivers software applications over the internet on a subscription or pay-as-you-go basis.
What is Software as a Service (SaaS)?
Modern malware is usually designed to implement some type of backdoor, also referred to as this.
What is a remote access trojan (RAT)?
On Linux, this command is used to elevate a user's privileges to execute a single command as the root user.
What is sudo or su?
For nearly all modern Ethernet copper cable standards, from Cat 5e to Cat 6a, this is the maximum effective transmission distance, measured in meters.
What is 100 meters (or 328 feet)?
This system behavior—often caused by a failing power supply or an improperly seated RAM module—is a classic indicator of intermittent power delivery issues.
What is a random shutdown (or intermittent reboot)?
This model offers greater control over privacy and security, making it ideal for banking and governmental services requiring strict access control.
What is Private?
An administrative control that details the proper and ethical way employees should use company computers, networks, and resources.
What is an Acceptable Use Policy (AUP)?
The name of the settings interface where users configure network, sound, display, and account preferences in current macOS versions (since Ventura), which replaced "System Preferences."
What is System Settings?
A 32-bit number that separates the network portion from the host portion of an IP address, determining which devices are on the same local network.
What is the Subnet Mask?
If a new external device is not recognized by the operating system at all, the technician should first check to see if the correct versions of this low-level software are installed.
What are the drivers?