In Linux, this command lists files in a directory.
ls
The mascot for this operating system is a penguin named Tux.
What is Linux?
A common IT support response, this phrase suggests restarting a device as the first troubleshooting step.
What is "Have you tried turning it off and on again?"
This cloud storage service from Google offers 15GB of free storage and syncs across devices.
What is Google Drive?
This type of cyberattack floods a network or website with excessive traffic to cause disruption.
What is a DDoS attack?
This command in Windows shows the network configuration, including IP address and default gateway.
Ipconfig
This version of Windows was widely considered a failure due to its confusing tile-based Start Menu.
What is Windows 8?
A popular cyber-themed meme, this hacker is often seen wearing a hoodie in a dark room, lit only by a laptop.
Who is "Hacker Man"?
Amazon's cloud computing service, commonly used for hosting websites and applications.
What is AWS (Amazon Web Services)?
A fake email designed to trick users into providing personal information is an example of this type of attack.
What is phishing?
This Linux command is used to change file permissions using symbolic or numeric values.
Chmod
The Time Machine backup feature is native to this operating system.
What is macOS?
This classic meme format shows a man distracted by a passing woman labeled as a tempting technology trend.
What is "Distracted Boyfriend"?
This Microsoft cloud platform provides solutions for virtual machines, storage, and AI.
What is Microsoft Azure?
This cybersecurity framework is commonly used by businesses to manage risk and includes "Identify, Protect, Detect, Respond, Recover."
What is the NIST Cybersecurity Framework?
In Windows, this command allows you to view active network connections, listening ports, and routing tables.
Netstat
This command-line based operating system, released in 1981, was the foundation for many early PCs.
What is MS-DOS?
This fictional character from a 1995 movie became an internet joke for saying, “I’m in” when hacking a system in seconds.
Who is "Hugh Jackman in Swordfish" or "Hackerman"?
The shared responsibility model in cloud security means this entity is responsible for securing the cloud infrastructure.
What is the cloud provider?
This term refers to malware that encrypts files and demands payment for decryption.
What is ransomware?
This Linux utility allows you to schedule commands to run at a specific time and date.
What is cron (or crontab for editing cron jobs)?
The XNU kernel is the foundation for this popular operating system.
What is macOS?
The phrase "It’s not a bug, it’s a feature" is commonly used to justify this type of unintended software behavior.
What is a design flaw (or unintended consequence)?
This type of cloud service is specifically designed for running containerized applications efficiently.
What is Kubernetes (or Container as a Service, CaaS)?
This cryptographic protocol is used to establish a secure connection between a web browser and a server.
What is TLS (Transport Layer Security)?