Boats Boats Boats
You look like trouble
Secure This
Pass the remote
A glorious view
100

You will use this Linux command to search for specific text within a file

What is grep?

100

This malicious software attempts to extort money from a target by encrypting the contents of a drive or just certain important files

What is Ransomware?

100

We avoid this service and port number unless we have an absolute need to enable it, grants remote access to another machine with NO security added

What is Telnet port 23?

100

This is a server designed to accept remote connections and provide Authentication, Authorization, and Accounting services to these remote users specifically, developed during the days of dial-up

What is RADIUS?

100

Use this Windows utility to rollback drivers, add hardware to the system, and check status of devices

What is Device Manager?

200

This command is used to change permissions on a file or directory in Linux and MacOS, may be functional in Powershell as well.

What is chmod?

200

An email from the email address ***@c0mptia.org should be treated as this when you receive the email

What is spam/delete/report if policy states to report?

200

I am using this kind of encryption when I send an email to someone I have never met and will never directly interact with outside of email, based on public and private key pairs

What is asymmetric encryption?

200

The port and service used for remote connection to another computer over a secure encrypted tunnel for device management or interaction, does not use a GUI

What is SSH SecureSHell port 22?

200

Use this command to repair system files within Windows

What is SFC system file checker?

300

All other users are granted these permissions for text.txt when the command chmod 755 text.txt is used

What is read and execute?

300

This type of malware runs in memory and spreads from network node to network node on it's own with no action by the user

What is a worm?

300

This principal states that users should only be granted permissions for what they absolutely need

What is the Principal of Least Privilege POLP?

300

This type of connection provides a secure, private tunnel over the open internet to connect from one end point to another network like you are there in person

What is a VPN?

300

You will change settings in this menu in nearly every OS to make a computer easier to use by a person with physical or mental disabilities and difficulties when using a computer

What is accessibility options?

400

Use this command in Linux to create a new file

What is touch?

400

This type of application is often installed by a program that has been compromised by malicious actors, is usually something unwanted and also potentially malicious or vulnerable

What is a PUP or PUA Potentially Unwanted Program/Application?

400

You will use one of these to compare if a file maintained integrity during transport to it's destination

What is a hash?

400

You will use this port and service to establish a remote connection to a Windows desktop most often, not as flexible as solutions from other platforms but very robust in function

What is RDP Remote Desktop Protocol 3389?

400

This secure port is used by the mail service that leaves a copy of emails on both the server and device unless the user deletes them themselves

What is port 993 IMAP Secure?

500

This MacOS utility is used for backing up data, specifically to an APFS formatted drive

What is Time Machine?

500

This kind of malware will track your actions in a logical sense, so not your physical actions but what sites you browse, what actions you've performed on your computer, usually with the purpose of delivering targeted ads but also often used for more malicious purposes, but is not responsible for delivering the ads itself, normally.

What is spyware?

500

When running a VM, this is the most common concern with external threats

What is VM escape? VM sprawl is common among internal threat actors and unintentional malicious actions, but not external threats

500

When dealing with having secure resolution of domain names, you will use this port and protocol to transmit the information securely

What is HTTPS port 443 for DoH or DNS over HTTPS?

500

You spent the entire weekend on the phone with your mother-in-law trying to fix her computer and come to class on Monday and Mike tells you you should have tried this solution in order to provide quick assistance to someone you have direct contact with in Windows

What is Quick Assist?

M
e
n
u