Computer Basics
Cybersecurity
Windows & Linux
Networking
CyberPatriot & Misc
100

What key combinations copy and paste?

What are Ctrl+C and Ctrl+V

100

What does a strong password usually contain?

Mixed-case letters, numbers, and symbols, of a sufficient length

100

What is the drive letter typically assigned to the main hard drive (or ssd) in Windows?

What is C

100

This numeric address uniquely identifies a system on the internet.

What is an IP address

100

CyberPatriot Windows and Linux images run on this type of software

What is a VM / Hypervizor / VMWare

200

What piece of hardware stores data persistently across reboots?

What is a hard drive (or ssd)

200

What piece of hardware or software selectively allows or blocks network connections based on criteria like port number or application?

What is a firewall

200

What Windows tool lets you view and kill running processes?

What is task manager

200

This command tests connectivity to a system by sending an "ICMP" request

What is ping

200

What kind of user account should not be used for everyday tasks due to high privileges?

What is an Administrator account

300

What does CPU stand for?

What is the Central Processing Unit

300

What type of attack tries to trick you into revealing sensitive information like passwords or credit card numbers?

What is phishing

300

In Linux, what command lists files in a directory?

What is ls

300

This internet service resolves domain names to IP addresses

What is DNS

300

Which software suite is useful in Windows for identifying unwanted programs that start automatically?

What is sysinternals/autoruns

400

What piece of software on a computer allows a user to interact with the underlying hardware through a user interface?

What is an Operating System

400

A one-time code sent by text message, as a second login step after entering a password, is an example of what type of control?

What is MFA/2FA

400

In Linux, what command-line tool lets you easily edit a file?

What is nano (or vim, emacs)

400
Requests to a web server do not use UDP, they use...

What is TCP

400

Why is it important to disable or remove unnecessary services?

It reduces surface area / fewer things for hackers to target

500

What piece of software allows an operating system to communicate with specific pieces of hardware?

What is a driver

500

What type of attack floods a system with traffic to make it unavailable for legitimate users?

What is a DDoS attack

500

In Windows, what does "secpol.msc" do?

Opens the Security Policy MMC dialog to configure security policies.

500

This functionality on a network switch lets multiple groups of computers be logically separated and unable to communicate, as if they were on separate switches.

What is a VLAN

500

What command, on both Windows and Linux, lists active network connections?

What is netstat

M
e
n
u