This type of malware locks files or systems and demands payment,often in cryptocurrency,for their release.
What is ransomware?
This classic social engineering attack tricks victims into revealing information by pretending to be a trusted person over email.
What is phishing?
This Windows Server role manages user accounts, computers, group policies, and authentication across a domain.
What is Active Directory Domain Services (AD DS)?
This device connects multiple network segments and makes forwarding decisions based on IP addresses.
What is a router?
This type of learning trains a model using labeled data to classify or predict outcomes.
What is supervised learning?
Often hidden inside legitimate-looking software, this malware gives attackers remote control over a victim’s system.
What is a Remote Access Trojan (RAT)?
This high-pressure technique relies on creating a false sense of urgency like claiming an account will be closed immediately to get someone to act quickly.
What is urgency or pretexting with urgency?
This command-line tool is used to test network connectivity and name resolution issues on a Windows Server by checking DNS entries.
What is nslookup?
This protocol uses port 53 and is responsible for translating domain names into IP addresses.
What is DNS?
This algorithm finds the best line that separates data into different classes by maximizing the margin.
What is a Support Vector Machine (SVM)?
This self-replicating threat spreads across networks without needing to attach itself to a host file, unlike viruses.
What is a worm?
This form of social engineering uses phone calls, often pretending to be tech support or a bank representative.
What is vishing?
This Windows Server feature automatically deploys OS images over the network to new machines.
What is Windows Deployment Services (WDS)?
This network model layer is responsible for end-to-end communication, error recovery, and segmentation in the OSI model.
What is the Transport layer?
This neural network layer type is commonly used in image recognition tasks to detect patterns like edges and shapes.
What is a convolutional layer?
A type of malware often delivered through phishing emails, designed to capture keystrokes, screenshots, or login credentials.
What is spyware?
This attack targets high-value individuals such as executives or administrators with highly personalized fraudulent messages.
What is spear phishing?
This protocol, configured in Windows Server, automatically assigns IP addresses to devices on a network.
What is DHCP?
This type of IP address is assigned manually and does not change unless edited by an administrator.
What is a static IP address?
This metric measures how far predicted values are from actual values, often used in regression models.
What is mean squared error (MSE)?
This stealthy malware stays hidden by modifying operating system processes, making it difficult to detect or remove.
What is a rootkit?
In this technique, an attacker follows someone into a restricted area by walking closely behind them and relying on politeness.
What is tailgating?
This type of Windows Server failover technology allows services to continue running on another node if one server fails.
What is Failover Clustering?
This tool sends echo requests to test network connectivity and report packet loss or latency.
What is ping?
This AI concept refers to models that generate new content like text, images, or audio based on learned patterns.
What is generative AI?