Operating Systems
Security
Software Troubleshooting
Operational Procedures
100

Command used to test connectivity between two devices. 

ping

100

retina scanners, palmprint scanners, or fingerprint scanners. Fingerprint scanners are most common since they are used on smartphones and tablets.

Biometrics

100

able to download from sources other than Google Play. Verify that site is reputable

Android package (APK) source

100

used to track support calls and give technicians a place to keep their call notes. These notes should include progress notes, who did what and when, and how the problem was resolved.

Ticketing systems

200

A utility in Windows that is used to lock down a hard drive by encrypting the entire Windows volume and any other volume on the drive. Also called BitLocker or BitLocker Encryption

BitLocker

200

encrypts your hard drive and holds it hostage until you pay money, usually in bitcoin.

Ransomware

200

errors that are caused by problems with devices, device drivers, or a corrupted Windows installation. Begin troubleshooting by searching the Microsoft website for the error message and a description of the problem.

Blue Screen Of Death (BSOD)

200

an environment in which users can practice with data and processes that don’t affect the real data and where mistakes have little consequence.

Sandbox Testing

300

Command prompt tool used to manage hard disk drives, partitions, and volumes, allowing you to create, delete, format, and resize them, as well as assign drive letters.

DiskPart

300

helps control which apps or services can use network connections.

Firewall

300

accessing the administrative privileges of the device. Voids all warranties and usually violates BYOD policies.

Root access/jailbreak

300

backs up only files that have changed or been created since the last backup, whether that backup is itself an incremental or a full backup.

Incremental Backup

400

A centralized, managed network environment where users, computers, and resources are organized and managed through Active Directory, allowing for easier administration and security control.

Domain Access

400

sends “Do Not Track” requests to websites you visit. Microsoft and Google say that even though you might send this request to a website, it does not guarantee that the website will honor the request.

Private-browsing mode

400

Rooting and Jailbreaking make it possible for apps to appear to be a legitimate app

Application spoofing

400

very common right now. Software must connect to the manufacturer’s licensing server to verify that the license and usage is valid. Think Microsoft365.

Digital Rights Management (DRM)

500

Another way to access troubleshooting and maintenance tools such as Disk Cleanup, Computer Management, Task Scheduler, etc.

Administrative Tools

500

an attack that happens before a security patch is released either because the developer wasn’t yet aware of the weakness, or the developer is still working on the patch.

Zero-day attack

500

CMOS battery need replacement. On a Windows domain, use the Windows Time Service (W32Time) or third-party software for time accuracy

Time drift

500

a legal term to describe data that can uniquely identify a person, including a Social Security number, email address, physical address, birthdate, birthplace, mother’s maiden name, marital status, phone numbers, race, and biometric data.

PII (Personally Identifiable Information)