Operating Systems
Security
Software Troubleshooting
Operational Procedures
Critical Thinking
100

This Windows tool is able to monitor the Processes on a computer. 

A)MsConfig    B)Task Manager    C)Remote Desktop

What is Task Manager?

The task manager is an advanced Windows tool that has 7 tabs that are used to monitor the Processes, Performance, App History, Startup, Users, Details, and Services on a computer.

100

This concept in computer security that limits users' access rights to only what is strictly required to do their jobs.

A)AUP   B)Least Privilege   C)Zero Trust   

What is least privilege 

Least privilege is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

100
It's a common and very popular remediation technique when a devices crashes or running sluggish


A)Reboot   B)Shutdown   C)Jailbreak

What is reboot

To reboot is to reload the operating system of a computer: to start it up again. Rebooting is usually necessary after a computer crashes, meaning it stops working because of a malfunction.

100

This procedure consist of a controlled environment and allow developers to run simulated scenarios while conducting experiments.

A)Linux   B)Change Request   C)Sandbox   D)Backup

What is Sandbox?

Sandbox testing involves creating a controlled and isolated environment, known as a "sandbox," that mimics a production environment. It's used for testing software, applications, or code changes without affecting the actual production system or end-users. In a sandbox, testers can simulate real-world scenarios, conduct experiments, and identify potential issues or vulnerabilities.

100

A customer is complaining that her laptop is too slow. You have thoroughly checked the device but cannot find anything wrong with it. What is an appropriate question to follow up with

What is Ask more details about the problem?

When dealing with a difficult customer or situation, you should follow five key principles: (1) Do not argue with customers and/or become defensive; (2) Avoid dismissing customer problems; (3) Avoid being judgmental; (4) Clarify customer statements (ask open-ended questions to narrow the problem's scope, restate the issue, or question to verify understanding); and (5) Do not disclose experiences via social media outlets.

200

This file system type is used by default when installing macOS on a modern workstation 

A) NTFS    B)APFS    C)FAT32

What is APFS?

The Apple file system (APFS) is the default file system for Mac computers using macOS 10.13 or later and features strong encryption, space sharing, snapshots, fast directory sizing, and an improved file system fundamentals

200

This type of attacks occurs when an attacker specifically targets the CEO, CFO, CIO, and other board members.

A)Whaling   B)Brute force   C)Ransomware

What is Whaling?

Whaling is an email-based or web-based form of phishing that targets senior executives or wealthy individuals.

200

This type of wireless connection requires a pin to be entered as part of the pairing process before it is utilized 

A)Infrared   B)Airdrop   C)Bluetooth   D)NFC

What is Bluetooth?

Wireless devices with Bluetooth radios must be paired with each other before they can communicate. This involves making them discoverable and entering a PIN as part of the pairing process

200

This system manages request, incidents, and problems. In addition, can be used to support both internal end-users and external customers.

What is Ticketing Systems?

A ticketing system manages requests, incidents, and problems. Ticketing systems can be used to support both internal end-users and external customers. It will contain a Ticket ID, user info, Device info and asset ID

200

You are manage a SOHO network for a small coffee shop. Certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the WiFi. You're tasked to block this customer's laptop from connecting by placing it on a blocklist. This configuration allows you to blocklist those customer's devices based on its unique hardware identifier.

What is MAC Filtering?

MAC filtering is the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect to the network.

300

This version of Windows supports Virtual Desktops.

Windows 8, Windows 8.1, Windows 10, Windows XP ?

What is Windows 10?

Windows 10 added support for Virtual Desktops. These allow users without multi-monitor setups to create multiple virtual desktops.

300

This device deployment model describes when a user's personal device is installed with corporate apps and data.

A)COPE   B)CYOD   C)MDM   D)BYOD

What is BYOD? 

A bring your own device (BYOD) policy allows, and sometimes encourages, employees to access enterprise networks and systems using personal mobile devices such as smartphones, tablets, and laptops.

300

It's the process of installing a new operating system on a machine.

A)Reimage   B)Reboot   C)Restore

What is Reimage?

This process includes wiping, or clearing, the hard drive entirely, and installing a fresh operating system with factory defaults.

300

This backup has the highest storage and time requirements but provides a baseline for restoring systems and  has the least recovery complexity as only a single file is required.

A)Incremental   B)Full   C)Synthetic  D)RAM

What is a full Backup?

A full backup is a complete and comprehensive backup of all selected data and files in a system or specific storage device. It includes all files, directories, databases, configurations, and other critical data necessary for the operation and recovery of a system. Full backups capture the entire dataset at a specific point in time, providing a baseline for restoring the system to its exact state at the time of the backup. This type of backup is typically the most time-consuming and resource-intensive, but it offers the fastest recovery time in the event of data loss or system failure.

300

Define the 3-2-1 backup rule

The 3-2-1 backup rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site.

400

this command-line tool is used on a Windows system to move upward in a directory within the system's directory structure.


what is cd..?

The cd command can be used to move directly to another directory or path if entered as "cd (some other directory or path)" into the command line

400

This type of malware encrypts the victim's data and the decryption key is withheld from the victim unless payment is received.

What is Ransomware?

 Ransomware is a type of malware designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.

400

This Microsoft status screen that indicates an error from which the system cannot recover, resulting in a system stop error (a crash screen).

What is Blue screen of death (BSOD)

A failing fixed disk and file corruption may cause a particularly severe read/write failure, resulting in a system stop error (a crash screen).

400

The two main protocols used for desktop-based remote access in Windows, Linux and masOS systems.

What is RDP and VNC?

RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) are remote desktop access technologies. RDP is developed by Microsoft, allowing users to access and control a remote Windows computer. VNC is a more platform-agnostic system that enables remote access and control of desktop environments across various operating systems like Windows, Linux, and macOS.

400

This feature in Windows Control Panel allow users to configure the Magnifier feature and zoom in on smaller fonts.

What is Ease of Use?

the Ease of Access section can be used to turn on the Magnifier that can zoom in anywhere on the screen to make everything in the area larger and easier for a visually impaired user to see.

500

This Windows 10 edition supports BitLocker, Remote Desktop Protocol, and domain access.

What is Windows 10 Pro?

Windows 10 Pro includes advanced features like BitLocker for encryption, Remote Desktop Protocol (RDP) for remote access, and domain access for networked environments

500

This following type of attack are usually used as part of an on-path attack? 

What is Spoofing?

Spoofing is often used to inject the attacker into the conversation path between the two parties. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source.

500

A popular unethical method of subverting the security controls built into the OS to gain unrestricted system-level access. 

Rooting/Jailbreaking

It allows user to obtain root privileges, sideload apps, change or add carriers, and customize the interface.

500

Those two regulatory frameworks consist of regulating data protection in regards to Healthcare data and Credit Card transactions.

What is HIPAA and PCI DSS?

PCI DSS (Payment Card Industry Data Security Standard) and HIPAA (Health Insurance Portability and Accountability Act) are regulatory frameworks in the United States. PCI DSS focuses on securing payment card data and transactions to prevent fraud and breaches within the financial industry. HIPAA, on the other hand, safeguards patient health information and establishes privacy and security standards within the healthcare industry, aiming to protect patient privacy and improve healthcare operations.

500

This method is used for distributing network traffic equally across a pool of resources that support an application.

What is Load Balancing?

It's the process of distributing network traffic across multiple servers. This ensures no single server bears too much demand. By spreading the work evenly, load balancing improves application responsiveness.

M
e
n
u