You will use this Linux command to search for specific text within a file
What is grep?
This malicious software attempts to extort money from a target by encrypting the contents of a drive or just certain important files
What is Ransomware?
We avoid this service and port number unless we have an absolute need to enable it, grants remote access to another machine with NO security added
What is Telnet port 23?
This is a server designed to accept remote connections and provide Authentication, Authorization, and Accounting services to these remote users specifically, developed during the days of dial-up
What is RADIUS?
Use this Windows utility to rollback drivers, add hardware to the system, and check status of devices
What is Device Manager?
This command is used to change permissions on a file or directory in Linux and MacOS, may be functional in Powershell as well.
What is chmod?
An email from the email address ***@c0mptia.org should be treated as this when you receive the email
What is spam/delete/report if policy states to report?
I am using this kind of encryption when I send an email to someone I have never met and will never directly interact with outside of email, based on public and private key pairs
What is asymmetric encryption?
The port and service used for remote connection to another computer over a secure encrypted tunnel for device management or interaction, does not use a GUI
What is SSH SecureSHell port 22?
Use this command to repair system files within Windows
What is SFC system file checker?
All other users are granted these permissions for text.txt when the command chmod 755 text.txt is used
What is read and execute?
This type of malware runs in memory and spreads from network node to network node on it's own with no action by the user
What is a worm?
This principal states that users should only be granted permissions for what they absolutely need
What is the Principal of Least Privilege POLP?
This type of connection provides a secure, private tunnel over the open internet to connect from one end point to another network like you are there in person
What is a VPN?
You will change settings in this menu in nearly every OS to make a computer easier to use by a person with physical or mental disabilities and difficulties when using a computer
What is accessibility options?
Use this command in Linux to create a new file
What is touch?
This type of application is often installed by a program that has been compromised by malicious actors, is usually something unwanted and also potentially malicious or vulnerable
What is a PUP or PUA Potentially Unwanted Program/Application?
You will use one of these to compare if a file maintained integrity during transport to it's destination
What is a hash?
You will use this port and service to establish a remote connection to a Windows desktop most often, not as flexible as solutions from other platforms but very robust in function
What is RDP Remote Desktop Protocol 3389?
This secure port is used by the mail service that leaves a copy of emails on both the server and device unless the user deletes them themselves
What is port 993 IMAP Secure?
This MacOS utility is used for backing up data, specifically to an APFS formatted drive
What is Time Machine?
This kind of malware will track your actions in a logical sense, so not your physical actions but what sites you browse, what actions you've performed on your computer, usually with the purpose of delivering targeted ads but also often used for more malicious purposes, but is not responsible for delivering the ads itself, normally.
What is spyware?
When running a VM, this is the most common concern with external threats
What is VM escape? VM sprawl is common among internal threat actors and unintentional malicious actions, but not external threats
When dealing with having secure resolution of domain names, you will use this port and protocol to transmit the information securely
What is HTTPS port 443 for DoH or DNS over HTTPS?
You spent the entire weekend on the phone with your mother-in-law trying to fix her computer and come to class on Monday and Mike tells you you should have tried this solution in order to provide quick assistance to someone you have direct contact with in Windows
What is Quick Assist?