Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Malware
Windows Command Prompt command used to list all directory's files and subdirectories contained in the current directory:
dir or dir *.*
A file system developed by Apple for its operating systems?
APFS
An application software that selectively blocks access to websites?
Content filter
An OS that uses web browser as its main user interface?
ChromeOS
Malicious software collecting information about users without their knowledge/consent is called:
Spyware
A command-line utility used for checking the reachability of a remote network host is called:
ping
A Microsoft-proprietary file system optimized for flash drives is known as:
exFAT
Going into your router settings and disabling this feature makes a WLAN harder to discover:
SSID Broadcast
A cloud service provided by a web browser vendor for sharing browser settings and data across all web browser instances installed on devices that are signed-in to the main account (e.g., Google Account, or Microsoft account).
Browser Synchronization
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions
sfc
A file system type specific to Microsoft Windows that offers better compression, increased file size limit, object permissions, disk quotas and encryption
NTFS
An optimal Wireless Access Point antenna placement provides a countermeasure against this type of mobile cybersecurity threat
war driving
Web caching involves storing copies of web files, like HTML pages or images, on a user's device or intermediary servers which improves what?
Page loading speeds
A malware type that exploits computing resources without the owner's consent?
Cryptominer
A Command Prompt utility in MS Windows that verifies the file system integrity and fix logical file system errors?
chkdsk
ext3 and ext4 are examples of default file systems used by:
Linux distributions
On a switch, a packet analyzer can be connected to an empty port and the switch can be configured to pass a copy of the data sent over one or multiple ports on that switch to the packet sniffer port allowing the administrator to monitor contents of the traffic passing through the switch. This is called what?
port mirroring
An Internet browser redirecting a user to a website other than intended indicates a security issue related to what?
DNS
A type of virus that infects the storage drive area containing the necessary data and code used to start the OS is known as:
Boot sector virus
A network command-line utility in MS Windows that tracks and displays the route taken by IP packets on their way to another host is known as:
tracert
The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of:
FAT32
A lightly protected subnet (a.k.a. DMZ) consisting of publicly available servers placed on the outside of the company's firewall is called:
Screened Subnet
The following symptoms can be used to describe what kind of an attack?
XSS attack