Identify what OS tool is referred to by the following attributes:
Task Manager
In computer security, this term refers to physical characteristics of the human body that can be used for identification and access control purposes.
Biometrics
A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as:
IP Address
Windows tool used for connecting remotely to the user's own computer where access is based on local password (local user account password)
Remote Desktop Protocol (RDP)
A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as:
Windows Updates
Microsoft Windows OS component that allows a user to view and manage installed hardware components and device drivers:
Device manager
A physical security access control system used to prevent unauthorized users from gaining access to restricted areas. For example, a two-door entrance point requiring some type of authentication before access is permitted
Mantrap
In Microsoft Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is:
Hidden
A dedicated device for managing encrypted connections established over an untrusted network, such as the Internet?
Resource exhaustion is the purpose of this type of attack
Denial of Service (DoS)
Identify what OS tool is referred to by the following attributes:
Event Viewer
A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as:
Principle of least privilege
This control panel applet tool allows users to manage network traffic on their computer with a high level of control by creating detailed rules for both incoming and outgoing connections, enabling precise filtering based on factors like specific applications, ports, IP addresses, and network profiles
Windows Firewall with Advanced Security tool
(wf.msc)
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
Secure Shell (SSH)
An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is referred to as:
Brute-force attack
A customizable framework providing access to a collection of system utilities (in the form of the so-called snap-ins) designed to manage networks, computers, services, and other system components
Microsoft Management Console (MMC)
A type of software that enables a centralized administration of mobile devices?
Mobile Device Management (MDM)
The following term is used to determine which network segment an IP address belongs to:
Subnet mask
Which type of VPN enables connectivity between two networks?
site-to-site
A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:
Zero-day attack
A tool in MS Windows which examines (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance:
Performance Monitor
A set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object:
Access Control List (ACL)
In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Give two examples of protocols used for implementing secure VPN tunnels:
IPsec & TLS
Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?
SQL injection attacks