Shells, Terminals, and Consoles
Operating system
Implement Backup and Recovery
Social Engineering
Random from Domain 1-5
100


This software component provides the core set of operation system functions. These include features for managing system hardware and for communication between software and hardware.


What is the kernel

100

The common command used to repair the first 512-byte sector (Master Boot Record) of a hard disk in Windows 10 is

What is bootrec /fixmbr

100

This term refers to the period between backup jobs and determines how much lost work can be tolerated based on how easily it can be reconstructed.

What is frequency

100

This type of attack involves an attacker gaining unauthorized access to a secure area by following someone who is authorized to enter.

What is tailgating

100

This provides a high-level overview of a workflow.

What is a process document

200

The combination of the Linux kernel and a set of customizable applications, along with a package manager and software repository, is known as this.

What is a distribution (or distro)

200

This type of software was once commonly installed in web browsers to handle multimedia objects embedded in web pages, but most types are now deprecated.

What is a browser plug-in

200

This term refers to the period that a backup job is kept, which is important for version control, recovering from malware infections, and meeting legal or regulatory requirements.

What is retention

200

This tactic is used when an attacker tries to gather information about an organization or individual by looking through discarded documents or media, potentially finding sensitive information.

What is dumpster diving

200

a computer network authentication protocol that verifies the identity of users and computers.

What is Kerberos

300

These are three common types of shells used in Linux, which share a core command set but differ in features like command history or syntax highlighting.

What are Bash, zsh, and ksh (Korn shell)

300

This wireless network authentication mode uses a passphrase-based mechanism to enable group authentication, deriving an encryption key from the passphrase.

What is WPA-Personal (WPA-PSK)

300

This backup rule recommends having three copies of your data, across two media types, with one copy stored offline and off-site, to mitigate disaster scenarios.

What is the 3-2-1 backup rule

300

In this type of attack, a threat actor watches a person enter sensitive information, like a password or PIN, either by looking over their shoulder or using surveillance equipment.

What is shoulder surfing

300

Command Shell uses these to perform actions

What is Cmdlets (Command-lets)

400

This object connects the terminal and the shell, handling the separate input and output streams for stdin, stdout, and stderr.

What is a teletype (tty) device

400

This Windows feature enables encryption of NTFS-formatted drives, with the encryption key stored in a TPM chip or on a USB drive.

What is BitLocker

400

What is the most widely used backup rotation scheme

Grand-Father-Son (GFS)

400

This form of social engineering occurs when a threat actor pretends to be from IT support and tries to persuade an employee to reveal their password or allow remote access.

What is impersonation

400

This is used for automating tasks in the Windows CMD interpreter and is often the simplest form of scripting on Windows systems 

Batch Scripting

500

These Linux distros, designed for use as client PCs, typically load a graphical desktop environment at startup, driven by an open-source version of the X Window Display system known as this.

What is Xorg

500

A user reports a PC is running slowly. The technician suspects it has a bad fragmented drive. What MMC Snap-In should you use?

What is msinfo32.exe

500

This type of backup produces a file containing all the data from the source and has the highest storage and time requirements, but the least recovery complexity.

What is fullback up

500

This social engineering technique is similar to tailgating, but in this case, the attacker enters a secure area with an employee's permission, often under the guise of a cleaning crew member.

What is piggybacking

500

This Focuses on the "who," "what," and "when" of tasks

What is SOP