Linux & Mac
Security
Troubleshooting
Operational Procedures
CMD Tools
100

This open-source operating system often uses a package manager like dnf or yum for software installation.

What is Red Hat based Distrobutions

100

This basic security measure verifies a user's identity at the point of entry of a system.

What is Authentication?

100

You replaced a laptop’s hard drive, but it's not recognized by the system.  What should be checked next?

what is the power and data cable connections?

100

This documentation is used to track the lifecycle, repair history, and configuration of company equipment.

What is asset management?

100

You need to check system file integrity and automatically replace corrupted files. This command helps.

What is sfc /scannow?

200

On macOS, this utility located in /Applications/Utilities allows users to manage volumes.

What is Disk Utility?

200

A form of malware that installs itself deep in an operating system and can often appear to be an operating system file.

What is a root kit?

200

A user reports slow performance only when opening large Excel files on the network. What is most likely the cause?

What is slow network performance?

200

This procedure outlines how to handle confidential customer data in compliance with legal and regulatory standards.

 What is a data privacy policies?

200

After a failed boot, this command repairs the BCD (Boot Configuration Data) store to restore system startup functionality.

What is bootrec /rebuildbcd?

300

In Linux, this command is used to change file permissions and is critical for securing system files.

 What is chmod?

300

This security protocol encrypts communications over wireless networks, and its often paired with AES

What is WPA2?

300

You have just completed an in-place Windows OS upgrade, but now the end user reports the network printer prints garbled output. What’s the most likely cause?

What is an outdated printer driver?

300

A technician must dispose of a hard drive containing sensitive client data. What’s the most secure method recommended?

What is physical destruction or degaussing?

300

This command displays detailed information about the system configuration, including hardware, OS build, and environment variables.

What is systeminfo?

400

This macOS feature allows users to run multiple virtual desktops and quickly switch between them, enhancing productivity.

 What is Mission Control?

400

These two security principles aim to minimize the number of users with access and reduce attack surfaces.

What are least privilege and access control?

400

After installing a new graphics card, the system powers on but doesn’t display output. POST beeps indicate no display. What’s next?

What is reseating the card or verifying correct power connections?

400

To prevent unauthorized software installation, this policy is often enforced through Active Directory Group Policy settings.

What is a software restriction policy?

400

You need to forcefully terminate a misbehaving application using its process ID (PID) from the CLI. This command does the job.

What is taskkill /PID [number] /F?

500

In Linux, this system initialization process has largely replaced older methods like SysVinit and manages services and daemons.

What is Systemd?

500

This type of attack intercepts communication between two parties without their knowledge, often using spoofing.

What is a man-in-the-middle attack?

500

A virtual machine freezes intermittently on a host with several VMs running at the same time. What system resources should be checked?

What is available RAM or CPU load on the host machine?

500

You’re performing a forensic analysis on a compromised workstation. What ensures evidence remains intact and admissible in court?

What is chain of custody?

500

To map a network drive persistently via command line, you’d use this utility followed by specific drive and path parameters.

What is net use [drive:] [\server\share] /persistent:yes?