This small program controls a hardware device and is installed by the OS during hardware access.
What is a device driver?
This Windows utility allows you to close unresponsive applications and view running processes.
What is Task Manager?
Android apps can be installed from unofficial sources using this method.
What is sideloading?
This type of malware disguises itself as a legitimate program.
What is a Trojan?
This essential communication skill involves listening without interrupting and asking clarifying questions.
What is active listening?
This partition type must be used for booting an operating system.
What is the active (primary) partition?
This folder stores 64-bit program files on a 64-bit version of Windows.
What is C:\Program Files?
This feature allows mobile devices to change from portrait to landscape orientation automatically.
What is the accelerometer?
This attack relies on tricking a user into revealing personal or financial information.
What is phishing?
This document outlines expectations between a service provider and customer, including response times and responsibilities.
What is an SLA (Service Level Agreement)?
This tool transfers user files and settings to a new Windows installation and replaces Windows Easy Transfer in newer versions.
What is the User State Migration Tool (USMT)?
This Windows component stores all system configuration settings as key–value pairs and should be edited with extreme caution.
What is the Windows Registry?
This Linux/Mac command lists files and directories in the current folder.
What is ls?
This principle states that users should only be granted the minimum access needed to perform their job.
What is the Principle of Least Privilege?
This legal concept requires tracking who collected evidence, who accessed it, and where it was stored.
What is chain of custody?
Windows 7, 8, and 10 use this boot manager program to locate and load the operating system.
What is BOOTMGR?
This command-line tool displays information about routes, interface statistics, and active TCP connections.
What is netstat?
This macOS utility provides a user-friendly backup solution similar to Linux’s Déjà Dup.
What is Time Machine?
This encryption technology can secure an entire hard drive and is supported by Windows Pro, Enterprise, and Education editions.
What is BitLocker?
This category of documentation includes acceptable use policies and restrictions on IT asset usage.
What are Policies?
This partitioning scheme supports up to 128 partitions, works with UEFI, and is limited only by the OS rather than the disk size.
What is GPT (GUID Partition Table)?
This powerful command shell uses "cmdlets," supports scripting automation, and includes its own ISE editor.
What is PowerShell?
This process removes manufacturer protections by unlocking the bootloader so a custom OS can be installed—on Android or iOS.
What is rooting or jailbreaking?
In a permissions scenario, this action causes a file to inherit new permissions if performed to a different volume.
What is copying (a file to a different volume)?
This type of customer often tries to control the call because they consider themselves highly experienced.
What is a knowledgeable customer?