This Windows utility allows you to view and modify the Windows Registry database.
What is Registry Editor (regedit)?
This type of malware appears legitimate but contains malicious code that executes when run.
What is a Trojan horse?
This command displays the current directory path in Windows Command Prompt
What is the CD (without parameters)?
What is restart the application, reboot, turn off /back on?
This document outlines step-by-step instructions for completing specific IT tasks.
What is a Standard Operating Procedure (SOP)?
This Command-line tool can check for and repair system file corruption in Windows.
What is SFC (System File Checker)?
This Windows feature encrypts individual files and folders rather than entire drives.
What is EFS (Encrypting File Systems)?
This Windows command copies simple, single files.
This Windows command copies directories and sub directories.
This Windows command is used for copying robust, complex, and reliable file directory mirroring and synchronization, especially in network environments or backups.
What is Copy?
What is XCopy?
What is RoboCopy?
This occurs when an application requires more system resources than are available.
What is inadequate RAM/storage?
Official approval process, I may need to provide Purpose, Scope, Risk analysis, and Backout Plan.
What is Change Management?
This Windows feature creates restores points to roll back system changes without affecting personal files.
What is System Restore?
This attack method involves tricking users into revealing sensitive information through fake emails or websites.
What is Phishing?
This command displays network configuration information including IP address, Subnet masks, and default gateway.
What is IPCONFIG?
This Windows tool shows running processes, system performances, and resource usage in real-time.
What is Task Manager?
Information related to potential hazards and safety precautions within an organization.
What is a Material Safety Data Sheet (MSDS)
This boot option starts Windows with minimal drivers and services for troubleshooting purposes.
What is Safe Mode?
This principle ensures users only have the minimum access rights needed to perform their job functions.
What is the principle of least privileges?
This Windows utility allows you to uninstall programs and windows features.
What is Programs and Features (or Add/Remove Programs)?
6 Steps of the Troubleshooting Process.
1. Identify the Problem
2. Establish a Theory
3. Test the Theory
4. Establish a Plan and Implement the Solution
5. Verify Full System Functionality
6. Document Findings
This Windows tool displays detailed system information including hardware, drivers, and running services.
What is MSinfo32 (Microsoft System Information)?
This type of attack floods a network or system with traffic to make it unavailable to legitimate users.
What is a DDoS (Distributed Denial of Service) attack?
This command displays the route packets take to reach a network destination.
What is TRACERT (Windows)
or
TRACEROUTE (Linux/Mac)?
Application is not working properly after I updated my computer from Windows 10 to Windows 11.
This process involves properly handling and disposing of computer equipment to protect sensitive data and the environment.
What is Asset disposal (or data sanitization and recycling)?