Operating Systems
Security
Software Troubleshooting
Operational Procedures
Bonus
100

What is considered the WORST os that proceeds to destroy itself with every update

Windows

100

What is the difference between a one time password and a time based one time password

A one time password is temporary but can be used any time but a time based one time password has to be used within a time frame.

100

The Windows operating system encounters a critical kernel error, driver conflict, or hardware failure it cannot recover from. You are then met with a blue screen with an error code 

Blue screen of death (BSOD)

100

What is the best use case for synthetic full backups? 

Best for large environments, limited network bandwidth, and where quick recovery times (RTO) are critical.

100

Why is it that street fighter 6 would slander the localized goat alex.

Due to widespread negative reaction, director Takayuki Nakayama addressed the issue on X, apologizing for "confusion" and promising to revise the "misleading" text passages in a future patch. Count your days buddy

200
What is an open source OS known for its security and stability and flexability
Linux
200

Why would it be better to use long, unique passwords instead of short, complex passwords. 

Short complex passwords can be cracked a lot easier with modern brute force tools while long passphrases are harder for these tools to crack


200

Which Windows feature allows you to revert system files to a previous state?

System Restore

200

What are the filenames for both the JavaScript file and the Python file?

.Js and .Py

200

Why did the cybersecurity analyst break up with their password?

Because it wasn’t strong enough to commit.

300

What OS is commonly used for apple SMARTPHONES

IOS

300

Why is impersonation and evil twin not considered the same kind of threat

Impersonation is a social engineering tactic in which the attacker mimics a legitimate user and evil twin is a malicious access point acting as a legitimate one (same SSID)

300

A software program on your windows computer is failing to open what is the first thing you should do?

Open task manager
300

While messing around with an AI model you have been asked to test, you notice that when asking it a history question it proceeds to state that Christopher columbous was a Indian tribe leader. What has the AI experienced?

A hallucination

300

What does the CIA in CIA triad stand for? 

Confidentiality, Integrity, and Availability

400

What OS is used for Apple TABLETS

IpadOS

400

Why would a company want to use BYOD (Bring Your Own Device) instead of corporate owned devices

Cost Savings, Employee Satisfaction, and Speed

400

How do you stop applications from starting automatically when your computer boots?

Startup in task manager

400

What is the Scale difference of RDP and RMM (Remote monitoring and management)

RDP is best for one-off, "one-to-one" connections. RMM is designed for managing "one-to-many" environments

400

What RAID combines both RAID 1 and RAID 0

RAID 10

500

What is NTFS and What OS is it mainly associoted with

New Technology File System (NTFS for short) is the default, proprietary file system for modern Windows operating systems 

500

What is UPnP, and what does it do?

Universal Plug N Play, networked devices, such as smart TVs, gaming consoles, routers, and IP cameras. Automatically discover each other and establish connections without manual configuration

500

Your computer is acting slow when opening up other software programs that are graphically intensive and the computer is crashing. Where should you go to check where the computer is crashing?

Event Viewer

500

Why is it very important to have an incident response plan 

it will help you respond quickly and effectively if an incident occurs. An incident response plan should lay out clear instructions for actions to take in case of a cyber incident. 

500

What file type can windows NOT support?

specific media formats lacking required codecs like .dvc, .rm, .ra, Linux-native file systems like .ext4, and older, proprietary, or corrupt files.