Operating System
Security
Software Troubleshoot
Operational Procedures
Random
100

This Microsoft operating system is very basic. It does not have full drive encryption, remote access or group policy.

What is MICROSOFT WINDOWS HOME EDITION

100

This uses physical traits to create a template stored in a database to authenticate individuals.

What are BIOMETRICS

100

What dreaded acronym, often associated with Windows operating systems, stands for the error screen that appears when the system encounters a critical error, forcing it to display a stop screen with diagnostic information?

What is BSOD BLUE SCREEN OF DEATH

100

In the world of IT, this is the practice involves tracking and maintaining detailed records of an organization's hardware and software assets throughout their lifecycle, aiding in inventory management, maintenance, and decision-making processes.

What is ASSET MANAGEMENT

100

In the realm of software testing, this testing environment isolates untested code changes and allows developers or testers to execute and assess the behavior of software without affecting the production environment

What is SANDBOX TESTING

200

This windows operating system has a 2 TB limit of RAM

What is WINDOWS PRO EDITION

Home 128 GB, Pro 2 TB, Pro for Workstation & Enterprise Edition 6 TB

200

______ are a subset of _________ that captures the typing of an individual

What are KEYLOGGERS & SPYWARE

200

What built-in Windows feature allows users to revert their computer's state to a previous point in time, undoing system changes that may be causing issues without affecting personal files?

What is SYSTEM RESTORE

200

This is an acronym, commonly found in corporate environments, refers to a document that outlines how an individual can use computer systems, networks, and information resources within an organization

What is AUP ACCEPTABLE USE POLICY

200

What built-in Windows feature, provides a set of tools and utilities to troubleshoot and repair issues that may prevent a Windows operating system from starting normally?

What is the WINDOWS RE (RECOVER ENVIRONMENT)

300

_______ is an ____ _____ operating system that allows for a lot of customization with the code and was created by Linus Torvalds.

What is LINUX & OPEN SOURCE

300
This is a method of data disposal that is using a powerful magnet to ensure the data can't be retrieved from a drive

What is DEGAUSSING

300

What term refers to the practice of installing Android applications from sources other than the official Google Play Store, potentially exposing devices to security risks due to the bypassing of standard app distribution channels?  

What is APK SIDELOADING

300

Part of change management, this strategic document outlines the step-by-step procedures to revert a system or application to a previous state in case of a deployment failure or unforeseen issues, ensuring a smooth recovery process and minimizing downtime

What is BACKOUT PLAN

300

In the realm of networking, what process involves the configuration of a router or firewall to allow specific external connections to reach internal devices, often used to enable remote access or host services?

What is PORT FORWARDING
400

This MMC is prebuilt and allows us to adjust the startup items in Windows 10, view performance metrics, and users logged into the PC.

What is the TASK MANAGER

400

This deceptive technique involves tricking individuals into revealing sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication?

What is PHISHING

400

These two terms describe the process of removing software restrictions imposed by the device manufacturer, allowing users to gain privileged control and access to the root or core system of their mobile devices, commonly done on Android and iOS platforms, respectively? Which on is Android which one is iOS?

What are ROOTING & JAILBREAKING

400

This is a backup strategy that involves copying only the data that has changed since the last backup, reducing storage space requirements and backup time compared to other backup methods?

What are INCREMENTAL BACKUPS

400

In the context of data security, this process involves converting input data (such as passwords or files) into a fixed-length string of characters, typically for the purpose of verification or integrity checking?

What is HASHING

500

_____ is the newest file system for Linux

_____ is the newest file system for Windows

_____ is the newest file system for MacOS

What is EXT4

What is NTFS

What is APFS

500

This cipher is used to secure WEP

This cipher is used to secure WPA

This cipher is used to secure WPA2

This cipher is used to secure WPA3

What is RC4 STREAM CIPHER

What is TKIP TEMPORAL KEY INTEGRAL PROTOCOL

What is AES ADVANCED ENCRYPTION STANDARD

What is AES ADVANCED ENCRYPTION STANDARD

500

These are the steps for CompTIA malware removal steps in order

What is 1) INVESTIGATE 2) QUARANTINE 3) DISABLE SYSTEM RESTORE 4) REMEDIATION 5) SCHEDULE SCANS & UPDATES 6) ENABLE SYSTEM RESTORE/NEW RESTORE POINT 7) EDUCATE THE END USER

500

What device, commonly used to protect electronic equipment, regulates and smoothens electrical power, correcting voltage fluctuations and filtering out noise to ensure a stable and clean power supply?

What is a LINE CONDITIONER

500

What acronym, often used in the context of enterprise IT, stands for the practice of remotely managing and securing mobile devices such as smartphones and tablets within an organization?

What is MDM (MOBILE DEVICE MANAGEMENT)
M
e
n
u