Systems that Operate
Security
The Software Sucks
Smooth Operator
Smells like smoke
100

What is  the function of ICMP Protocol

This is Ping

100

Device that blocks access to a USB Port

What is a USB Lock

100

How does Microsoft deliver important and Critical Software Patches

Windows Update

100

This is the next step when a mobile device is brought with an application that is unresponsive and frozen. 

Hard Reset  (Sleep/Wake & Home button Iphone or Volume and Power Button Android for at least 10 seconds) 
100

What is a common Cause of tripping and what is the fix?

Cables are a common cause of tripping. If at all possible, run cables through drop ceilings or through conduits to keep them outof the way. If you need to lay a cable through a trafficked area, use a cable floor guard to keep the cables in place and safe from

200

This way of partitioning a hard-drive is a legacy accommodation for low memory systems that might still be needed by some applications. 

SWAP Partition

200

This security mechanism would protect servers from

future theft

What is a Server Lock  (Also A lock on the Rack Door) - Bold Move Rack Thief! 

200

What is a bare minimum to protect a PC from malware

AntiVirus Software


200

This Windows Console allows you to make changes to the boot settings.

MSCONFIG


200

Two saftey hazards when you open a case

Electrical Shock - Sharp Edges


300

What are three possible  command line tools

ipconfig, ping, tracert, netstat, nslookup, net use,net user, dism

300

Entry control roster requires this physical security measure 

 Security Guard and/or ID badges

300

Most problematic setting when it comes to slow boot time in Windows 10

What is the Fast Startup Option Check box (Disable this in System/Power & Sleep/Advanced Power Options)
300
Three possible reasons for a computer slowdown

what is a hardware failure, an excessively full hard drive, not enough virtual memory, or malware.


Other possibilities Rogue antivirus, hijacked email, DNS misconfiguration (network connected) 

300

This agreement when installing an application describes the limited way you can use the software 


EULA: When you buy an application, you aren’t actually buying the application. Instead, you’re buying the right to use the application

400

This is the purpose of the CMD line  [..]  Double Dot

What is .. added to a CMD to move up in the directory structure from the current directory


400

What is the secure version of Telnet

SSH


400

What is a way send a large file with no working USB, disk drive or Network Share that is too large for email using third party software

If the user has third-party software offering file sharing capability, then the file could be shared with others.  Not necessary to use VPN depending on sensitivity of the data

400
Action to take before installing AntiVirus

What is prudent: create a Backup Restore Point

400

What is the best way to clean out a internal fan clogged with dust

Compressed Air, Saftey Glasses


500

These are the current primary or default file systems for each dominate OS (Windows, MAC and Linux)

What is NTFS (Windows) Legacy FAT and FAT32 - APFS+ for MAC Legacy HFS+ and HFS and ext4 for LINUX

500

In the news, What common protocol used for accessing computers was found to have a major Ransomware exploit found? 

RDP


500

This is what PCI refers too when dealing with a category of sensitive financial data

The Payment Card Industry Data Security Standard (PCI DSS) applies to any organization that handles credit card data or processes or stores payment transactions from bank cards.

500

These two options are quickest for getting your system running again after a blue screen - failed driver update in windows 

What is Boot to Safe Mode (Installs Stnd Driver)

Boot to Last known Good Configuration (Assuming a Restore Point has been made)

500

What do you do when you seize a workstation from an employee suspected of illegal activity

Preserve Chain of Custody

After the device or data has been preserved, someone needs to keep track of it before it’s handed over to the proper authorities. The specific next step depends on your documented chain of custody policy. Depending on the situation, materials may be held in a safe, locked location at the office, or they may need to be turned over to authorities