Windows Features & Tools
Physical & Logical Security
Windows Networking Features
Remote Access Technologies
Threats & Vulnerabilities
100

Identify what OS tool is referred to by the following attributes:

  • Allows to close a non-responsive application in Windows
  • Displays information on programs, processes, and services that are currently running on the computer 
  • Provides real-time reports on how a Windows-based computer is using system resources (CPU/RAM/Disk/Network/GPU usage)

Task Manager

100

In computer security, this term refers to physical characteristics of the human body that can be used for identification and access control purposes.

Biometrics

100

A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as:

IP Address

100

Windows tool used for connecting remotely to the user's own computer where access is based on local password (local user account password)

Remote Desktop Protocol (RDP)

100

A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as:

Windows Updates

200

Microsoft Windows OS component that allows a user to view and manage installed hardware components and device drivers:

Device manager

200

A physical security access control system used to prevent unauthorized users from gaining access to restricted areas. For example, a two-door entrance point requiring some type of authentication before access is permitted

Mantrap

200

In Microsoft Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is:

Hidden

200

A dedicated device for managing encrypted connections established over an untrusted network, such as the Internet?

VPN Concentrator
200

Resource exhaustion is the purpose of this type of attack

Denial of Service (DoS)

300

Identify what OS tool is referred to by the following attributes:

  • Monitoring system health and troubleshooting problems with applications, OS, and hardware
  • Allows for browsing and managing event logs.
  • Depending on the severity the logs display events that fall into three categories: Information, Warning, and Error.

Event Viewer

300

A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as:

Principle of least privilege

300

This control panel applet tool allows users to manage network traffic on their computer with a high level of control by creating detailed rules for both incoming and outgoing connections, enabling precise filtering based on factors like specific applications, ports, IP addresses, and network profiles

Windows Firewall with Advanced Security tool 

(wf.msc)

300

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

Secure Shell (SSH)

300

An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is referred to as:

Brute-force attack

400

A customizable framework providing access to a collection of system utilities (in the form of the so-called snap-ins) designed to manage networks, computers, services, and other system components

Microsoft Management Console (MMC)

400

A type of software that enables a centralized administration of mobile devices?

Mobile Device Management (MDM)

400

The following term is used to determine which network segment an IP address belongs to:

Subnet mask

400

Which type of VPN enables connectivity between two networks?

site-to-site

400

A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:

Zero-day attack

500

A tool in MS Windows which examines (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance:

Performance Monitor

500

A set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object:

Access Control List (ACL)

500

In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as:

A proxy
500

Give two examples of protocols used for implementing secure VPN tunnels:

IPsec & TLS

500

Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?

SQL injection attacks