What key combinations copy and paste?
What are Ctrl+C and Ctrl+V
What does a strong password usually contain?
Mixed-case letters, numbers, and symbols, of a sufficient length
What is the drive letter typically assigned to the main hard drive (or ssd) in Windows?
What is C
This numeric address uniquely identifies a system on the internet.
What is an IP address
CyberPatriot Windows and Linux images run on this type of software
What is a VM / Hypervizor / VMWare
What piece of hardware stores data persistently across reboots?
What is a hard drive (or ssd)
What piece of hardware or software selectively allows or blocks network connections based on criteria like port number or application?
What is a firewall
What Windows tool lets you view and kill running processes?
What is task manager
This command tests connectivity to a system by sending an "ICMP" request
What is ping
What kind of user account should not be used for everyday tasks due to high privileges?
What is an Administrator account
What does CPU stand for?
What is the Central Processing Unit
What type of attack tries to trick you into revealing sensitive information like passwords or credit card numbers?
What is phishing
In Linux, what command lists files in a directory?
What is ls
This internet service resolves domain names to IP addresses
What is DNS
Which software suite is useful in Windows for identifying unwanted programs that start automatically?
What is sysinternals/autoruns
What piece of software on a computer allows a user to interact with the underlying hardware through a user interface?
What is an Operating System
A one-time code sent by text message, as a second login step after entering a password, is an example of what type of control?
What is MFA/2FA
In Linux, what command-line tool lets you easily edit a file?
What is nano (or vim, emacs)
What is TCP
Why is it important to disable or remove unnecessary services?
It reduces surface area / fewer things for hackers to target
What piece of software allows an operating system to communicate with specific pieces of hardware?
What is a driver
What type of attack floods a system with traffic to make it unavailable for legitimate users?
What is a DDoS attack
In Windows, what does "secpol.msc" do?
Opens the Security Policy MMC dialog to configure security policies.
This functionality on a network switch lets multiple groups of computers be logically separated and unable to communicate, as if they were on separate switches.
What is a VLAN
What command, on both Windows and Linux, lists active network connections?
What is netstat