BOOT CAMP BASICS
TWEAKING WINDOWS
BEYOND WINDOWS
CYBER CAT & MOUSE
TECH HUMAN NATURE
100

This small program controls a hardware device and is installed by the OS during hardware access.

What is a device driver?

100

This Windows utility allows you to close unresponsive applications and view running processes.

What is Task Manager?

100

Android apps can be installed from unofficial sources using this method.

What is sideloading?

100

This type of malware disguises itself as a legitimate program.

What is a Trojan?

100

This essential communication skill involves listening without interrupting and asking clarifying questions.

What is active listening?

200

This partition type must be used for booting an operating system.

What is the active (primary) partition?

200

This folder stores 64-bit program files on a 64-bit version of Windows.

What is C:\Program Files?

200

This feature allows mobile devices to change from portrait to landscape orientation automatically.

What is the accelerometer?

200

This attack relies on tricking a user into revealing personal or financial information.

What is phishing?

200

This document outlines expectations between a service provider and customer, including response times and responsibilities.

What is an SLA (Service Level Agreement)?

300

This tool transfers user files and settings to a new Windows installation and replaces Windows Easy Transfer in newer versions.

What is the User State Migration Tool (USMT)?

300

This Windows component stores all system configuration settings as key–value pairs and should be edited with extreme caution.

What is the Windows Registry?

300

This Linux/Mac command lists files and directories in the current folder.

What is ls?

300

This principle states that users should only be granted the minimum access needed to perform their job.

What is the Principle of Least Privilege?

300

This legal concept requires tracking who collected evidence, who accessed it, and where it was stored.

What is chain of custody?

400

Windows 7, 8, and 10 use this boot manager program to locate and load the operating system.

What is BOOTMGR?

400

This command-line tool displays information about routes, interface statistics, and active TCP connections.

What is netstat?

400

This macOS utility provides a user-friendly backup solution similar to Linux’s Déjà Dup.

What is Time Machine?

400

This encryption technology can secure an entire hard drive and is supported by Windows Pro, Enterprise, and Education editions.

What is BitLocker?

400

This category of documentation includes acceptable use policies and restrictions on IT asset usage.

What are Policies?

500

This partitioning scheme supports up to 128 partitions, works with UEFI, and is limited only by the OS rather than the disk size.

What is GPT (GUID Partition Table)?

500

This powerful command shell uses "cmdlets," supports scripting automation, and includes its own ISE editor.

What is PowerShell?

500

This process removes manufacturer protections by unlocking the bootloader so a custom OS can be installed—on Android or iOS.

What is rooting or jailbreaking?

500

In a permissions scenario, this action causes a file to inherit new permissions if performed to a different volume.  

What is copying (a file to a different volume)?

500

This type of customer often tries to control the call because they consider themselves highly experienced.

What is a knowledgeable customer?