Operating Systems
Security
Software Troubleshooting
Operational Procedures
Command Line Tools
100

This edition of Windows 10 is designed for regular (non-corporate) users and lacks features like BitLocker and Domain Join.

What is Windows 10 Home?

100

This type of malware encrypts a user's data and demands payment for its release.

What is ransomware?

100

On a Mac, this built-in software app helps diagnose disk and file system issues and allows the users to partition drives. 

What is Disk Utility?

100

This procedure ensures you have a copy of important data in case of accidental deletion, corruption, or system failure.

What is a backup?

100

This Linux command displays the current directory in the terminal.

What is pwd?

200

This open-source operating system is commonly used on servers and offers various distributions like Ubuntu and Fedora.

What is Linux?

200

This is the most common type of attack that tricks users into revealing sensitive information by pretending to be a trustworthy source.

What is phishing?

200

This Windows utility allows users to return the system to a previous state without affecting personal files.

What is System Restore?

200

This document outlines steps to follow in case of a security breach, hardware failure, or natural disaster.

What is a disaster recovery plan?

200

This Linux command is used to list the files and directories in the current working directory.

What is ls?

300

In Windows, this GUI tool allows users to manage partitions and format drives.

What is Disk Management?

300

This type of attack overwhelms a system or network with excessive traffic, causing an interruption to regular operations. 

What is a DoS or DDoS (Distributed Denial of Service) attack?

300

This term describes a small piece of software or piece of code added to software used to correct a specific issue within an application or operating system.

What is a patch?

300

This type of diagram visually represents the structure and connections within a network.

What is a network topology diagram?

300

This command-line tool tests the ability of the host to reach a destination by sending ICMP Echo Requests.

What is ping?

400

This file system, introduced with Windows NT, supports features like file permissions and encryption.

What is NTFS (New Technology File System)?

400

This protocol encrypts data sent over a network and is commonly used to secure websites.

What is HTTPS (Hypertext Transfer Protocol Secure)?

400

This tool in Windows allows users to view and analyze system performance and resource usage in real-time.

What is Performance Monitor?

400

This term describes the practice of ensuring that data is accurate, complete, and reliable throughout its lifecycle. (Part of triad)

What is data integrity?

400

This Windows command is used to map a network drive to a shared folder using a drive letter. (2 words) 

What is net use? 

500

This Windows feature allows users to run older applications in an environment that mimics earlier versions of Windows.

What is Compatibility Mode?

500

This type of physical security control involves verifying a user’s identity using something they are, like a fingerprint or facial scan.

What is biometric authentication?

500

On a Linux system, this command terminates a process using its Process ID (PID).

What is kill?

500

Before working on internal components of a PC, this tool should be used to prevent electrostatic discharge (ESD).

What is an anti-static wrist strap?

500

This command lists all active network connections and listening ports on a Windows machine.

What is netstat?

M
e
n
u