This component is considered the “brain” of the computer.
What is the CPU?
This protocol translates domain names into IP addresses.
What is DNS?
A user cannot log in and receives a “password incorrect” message after multiple attempts. This condition may have occurred.
What is account lockout?
This type of attack tricks users into revealing credentials through fake emails.
What is phishing?
This type of memory is volatile and is cleared when the system is powered off.
What is RAM?
This device connects multiple networks and routes traffic between them.
What is a router?
A computer is extremely slow and Task Manager shows 100% disk usage. This process is often responsible after updates.
What is Windows Update?
This framework provides best practices for cybersecurity controls, widely used in the U.S.
What is the NIST Cybersecurity Framework?
This storage device has no moving parts and is faster than a traditional HDD.
What is an SSD?
This port is commonly used for HTTPS traffic.
What is port 443?
Outlook opens but won’t send or receive emails. This profile repair tool is commonly used to fix it.
What is rebuilding or recreating the Outlook profile?
This security principle gives users only the access necessary to perform their job.
What is the Principle of Least Privilege?
This server component distributes electrical power to internal hardware components.
What is a Power Supply Unit (PSU)?
This command is used to test connectivity between two devices.
What is ping?
A GPO was applied but settings are not taking effect. This command forces policy refresh.
What is gpupdate /force?
This attack encrypts your files and demands payment for decryption.
What is ransomware?
What is TPM?
This device forwards traffic within the same local network using MAC addresses.
What is a switch?
After a firewall change, only one application stops working while others function normally. This is likely blocked.
What is a specific port or protocol?
This security model assumes no user or device is trusted by default, even inside the network.
What is Zero Trust?