Linux Mint
Windows
Networks
Miscellaneous
Command Line
100

Synaptic Package Manager 

Software Manager 

Update Manger

GUI programs for managing software

100

Useful for auditing users or groups

Local Users and Groups 

100

refers to unauthorized intrusion into a network or an individual computer, typically accompanied by an alteration to the system.

Hacking

100

A record of your internet activity

Digital Footprint

100

change to a specific directory

Cd


200

Allows you to have access to everything, no restrictions.

Root


200

Examines current security posture

SmartScreen, Virus protection, Internet Security and User AccountControl Settings

Security and Maintenance

200

is a seven-layer conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.

The Open Systems Interconnection Model

200

Elementary Pop Culture for 100:
It's the title of a Black Sabbath song, or, a Robert Downey Jr. movie.

Iron Man

200

Shows processes running with current user ID (UID) associated with current terminal

ps

300

When a process’ parent dies, that process is known as an orphan process, and ____becomes its parent.

Init 

300

Many important security policies are in User Rights Assignmentand Security Options.

Local Security Policy

300

consists of electronic circuity, media and connectors

Physical Layer

300

A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common cyberattack on the internet?

Phishing

300

easily find files on your system

GNU Findutils

400

Contains password information

Password is encrypted (hashed)

/etc/shadow  

400

Hidden Shares contain_____

$

400

are addresses that are globally routed between ISP (internet service provider) routers.

Public IPv4 addresses

400

2020 Nintendo Switch game subtitled "New Horizons"

Animal Crossing 

400

Search the contents of files for a pattern

grep

500

Displays entries from database

passwd, shadow, or group

GETENT

500

When defined, overrides settings set elsewhere and can only be changed through Group Policy.

Local Group Policy Editor

500

allows IPv4 and IPv6 to coexist on same network segment.

Dual stack  

500

Stuart, Kevin and Bob

Minions

500

Runs commands periodically

anacron