What is the function of ICMP Protocol
This is Ping
Device that blocks access to a USB Port
What is a USB Lock
How does Microsoft deliver important and Critical Software Patches
Windows Update
This is the next step when a mobile device is brought with an application that is unresponsive and frozen.
What is a common Cause of tripping and what is the fix?
Cables are a common cause of tripping. If at all possible, run cables through drop ceilings or through conduits to keep them outof the way. If you need to lay a cable through a trafficked area, use a cable floor guard to keep the cables in place and safe from
This way of partitioning a hard-drive is a legacy accommodation for low memory systems that might still be needed by some applications.
SWAP Partition
This security mechanism would protect servers from
future theft
What is a Server Lock (Also A lock on the Rack Door) - Bold Move Rack Thief!
What is a bare minimum to protect a PC from malware
AntiVirus Software
This Windows Console allows you to make changes to the boot settings.
MSCONFIG
Two saftey hazards when you open a case
Electrical Shock - Sharp Edges
What are three possible command line tools
ipconfig, ping, tracert, netstat, nslookup, net use,net user, dism
Entry control roster requires this physical security measure
Security Guard and/or ID badges
Most problematic setting when it comes to slow boot time in Windows 10
what is a hardware failure, an excessively full hard drive, not enough virtual memory, or malware.
Other possibilities Rogue antivirus, hijacked email, DNS misconfiguration (network connected)
This agreement when installing an application describes the limited way you can use the software
EULA: When you buy an application, you aren’t actually buying the application. Instead, you’re buying the right to use the application
This is the purpose of the CMD line [..] Double Dot
What is .. added to a CMD to move up in the directory structure from the current directory
What is the secure version of Telnet
SSH
What is a way send a large file with no working USB, disk drive or Network Share that is too large for email using third party software
If the user has third-party software offering file sharing capability, then the file could be shared with others. Not necessary to use VPN depending on sensitivity of the data
What is prudent: create a Backup Restore Point
What is the best way to clean out a internal fan clogged with dust
Compressed Air, Saftey Glasses
These are the current primary or default file systems for each dominate OS (Windows, MAC and Linux)
What is NTFS (Windows) Legacy FAT and FAT32 - APFS+ for MAC Legacy HFS+ and HFS and ext4 for LINUX
In the news, What common protocol used for accessing computers was found to have a major Ransomware exploit found?
RDP
This is what PCI refers too when dealing with a category of sensitive financial data
The Payment Card Industry Data Security Standard (PCI DSS) applies to any organization that handles credit card data or processes or stores payment transactions from bank cards.
These two options are quickest for getting your system running again after a blue screen - failed driver update in windows
What is Boot to Safe Mode (Installs Stnd Driver)
Boot to Last known Good Configuration (Assuming a Restore Point has been made)
What do you do when you seize a workstation from an employee suspected of illegal activity
Preserve Chain of Custody
After the device or data has been preserved, someone needs to keep track of it before it’s handed over to the proper authorities. The specific next step depends on your documented chain of custody policy. Depending on the situation, materials may be held in a safe, locked location at the office, or they may need to be turned over to authorities