This software component provides the core set of operation system functions. These include features for managing system hardware and for communication between software and hardware.
What is the kernel
The common command used to repair the first 512-byte sector (Master Boot Record) of a hard disk in Windows 10 is
What is bootrec /fixmbr
This term refers to the period between backup jobs and determines how much lost work can be tolerated based on how easily it can be reconstructed.
What is frequency
This type of attack involves an attacker gaining unauthorized access to a secure area by following someone who is authorized to enter.
What is tailgating
This provides a high-level overview of a workflow.
What is a process document
The combination of the Linux kernel and a set of customizable applications, along with a package manager and software repository, is known as this.
What is a distribution (or distro)
This type of software was once commonly installed in web browsers to handle multimedia objects embedded in web pages, but most types are now deprecated.
What is a browser plug-in
This term refers to the period that a backup job is kept, which is important for version control, recovering from malware infections, and meeting legal or regulatory requirements.
What is retention
This tactic is used when an attacker tries to gather information about an organization or individual by looking through discarded documents or media, potentially finding sensitive information.
What is dumpster diving
a computer network authentication protocol that verifies the identity of users and computers.
What is Kerberos
These are three common types of shells used in Linux, which share a core command set but differ in features like command history or syntax highlighting.
What are Bash, zsh, and ksh (Korn shell)
This wireless network authentication mode uses a passphrase-based mechanism to enable group authentication, deriving an encryption key from the passphrase.
What is WPA-Personal (WPA-PSK)
This backup rule recommends having three copies of your data, across two media types, with one copy stored offline and off-site, to mitigate disaster scenarios.
What is the 3-2-1 backup rule
In this type of attack, a threat actor watches a person enter sensitive information, like a password or PIN, either by looking over their shoulder or using surveillance equipment.
What is shoulder surfing
Command Shell uses these to perform actions
What is Cmdlets (Command-lets)
This object connects the terminal and the shell, handling the separate input and output streams for stdin, stdout, and stderr.
What is a teletype (tty) device
This Windows feature enables encryption of NTFS-formatted drives, with the encryption key stored in a TPM chip or on a USB drive.
What is BitLocker
What is the most widely used backup rotation scheme
Grand-Father-Son (GFS)
This form of social engineering occurs when a threat actor pretends to be from IT support and tries to persuade an employee to reveal their password or allow remote access.
What is impersonation
This is used for automating tasks in the Windows CMD interpreter and is often the simplest form of scripting on Windows systems
Batch Scripting
These Linux distros, designed for use as client PCs, typically load a graphical desktop environment at startup, driven by an open-source version of the X Window Display system known as this.
What is Xorg
A user reports a PC is running slowly. The technician suspects it has a bad fragmented drive. What MMC Snap-In should you use?
What is msinfo32.exe
This type of backup produces a file containing all the data from the source and has the highest storage and time requirements, but the least recovery complexity.
What is fullback up
This social engineering technique is similar to tailgating, but in this case, the attacker enters a secure area with an employee's permission, often under the guise of a cleaning crew member.
What is piggybacking
This Focuses on the "who," "what," and "when" of tasks
What is SOP