This Microsoft operating system is very basic. It does not have full drive encryption, remote access or group policy.
What is MICROSOFT WINDOWS HOME EDITION
This uses physical traits to create a template stored in a database to authenticate individuals.
What are BIOMETRICS
What dreaded acronym, often associated with Windows operating systems, stands for the error screen that appears when the system encounters a critical error, forcing it to display a stop screen with diagnostic information?
What is BSOD BLUE SCREEN OF DEATH
In the world of IT, this is the practice involves tracking and maintaining detailed records of an organization's hardware and software assets throughout their lifecycle, aiding in inventory management, maintenance, and decision-making processes.
What is ASSET MANAGEMENT
In the realm of software testing, this testing environment isolates untested code changes and allows developers or testers to execute and assess the behavior of software without affecting the production environment
What is SANDBOX TESTING
This windows operating system has a 2 TB limit of RAM
What is WINDOWS PRO EDITION
Home 128 GB, Pro 2 TB, Pro for Workstation & Enterprise Edition 6 TB
______ are a subset of _________ that captures the typing of an individual
What are KEYLOGGERS & SPYWARE
What built-in Windows feature allows users to revert their computer's state to a previous point in time, undoing system changes that may be causing issues without affecting personal files?
What is SYSTEM RESTORE
This is an acronym, commonly found in corporate environments, refers to a document that outlines how an individual can use computer systems, networks, and information resources within an organization
What is AUP ACCEPTABLE USE POLICY
What built-in Windows feature, provides a set of tools and utilities to troubleshoot and repair issues that may prevent a Windows operating system from starting normally?
What is the WINDOWS RE (RECOVER ENVIRONMENT)
_______ is an ____ _____ operating system that allows for a lot of customization with the code and was created by Linus Torvalds.
What is LINUX & OPEN SOURCE
What is DEGAUSSING
What term refers to the practice of installing Android applications from sources other than the official Google Play Store, potentially exposing devices to security risks due to the bypassing of standard app distribution channels?
What is APK SIDELOADING
Part of change management, this strategic document outlines the step-by-step procedures to revert a system or application to a previous state in case of a deployment failure or unforeseen issues, ensuring a smooth recovery process and minimizing downtime
What is BACKOUT PLAN
In the realm of networking, what process involves the configuration of a router or firewall to allow specific external connections to reach internal devices, often used to enable remote access or host services?
This MMC is prebuilt and allows us to adjust the startup items in Windows 10, view performance metrics, and users logged into the PC.
What is the TASK MANAGER
This deceptive technique involves tricking individuals into revealing sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication?
What is PHISHING
These two terms describe the process of removing software restrictions imposed by the device manufacturer, allowing users to gain privileged control and access to the root or core system of their mobile devices, commonly done on Android and iOS platforms, respectively? Which on is Android which one is iOS?
What are ROOTING & JAILBREAKING
This is a backup strategy that involves copying only the data that has changed since the last backup, reducing storage space requirements and backup time compared to other backup methods?
What are INCREMENTAL BACKUPS
In the context of data security, this process involves converting input data (such as passwords or files) into a fixed-length string of characters, typically for the purpose of verification or integrity checking?
What is HASHING
_____ is the newest file system for Linux
_____ is the newest file system for Windows
_____ is the newest file system for MacOS
What is EXT4
What is NTFS
What is APFS
This cipher is used to secure WEP
This cipher is used to secure WPA
This cipher is used to secure WPA2
This cipher is used to secure WPA3
What is RC4 STREAM CIPHER
What is TKIP TEMPORAL KEY INTEGRAL PROTOCOL
What is AES ADVANCED ENCRYPTION STANDARD
What is AES ADVANCED ENCRYPTION STANDARD
These are the steps for CompTIA malware removal steps in order
What is 1) INVESTIGATE 2) QUARANTINE 3) DISABLE SYSTEM RESTORE 4) REMEDIATION 5) SCHEDULE SCANS & UPDATES 6) ENABLE SYSTEM RESTORE/NEW RESTORE POINT 7) EDUCATE THE END USER
What device, commonly used to protect electronic equipment, regulates and smoothens electrical power, correcting voltage fluctuations and filtering out noise to ensure a stable and clean power supply?
What is a LINE CONDITIONER
What acronym, often used in the context of enterprise IT, stands for the practice of remotely managing and securing mobile devices such as smartphones and tablets within an organization?