Use this for last-mile review. Star weak rows and re-drill with practice.
1) Windows editions & features (quick map)
Feature | Home | Pro | Enterprise/Education | Notes |
---|
Domain join / Group Policy | ✗ | ✓ | ✓ | Business environments |
BitLocker | ✗ | ✓ | ✓ | Full-disk encryption |
Hyper-V | ✗ | ✓ | ✓ | Virtualization |
Remote Desktop host | ✗ | ✓ | ✓ | Client → host access |
Assigned Access / AppLocker | ✗ | Limited | ✓ | Kiosk / allow-lists |
Need | Tool | Path |
---|
System overview | System / About | Settings → System → About |
Device drivers | Device Manager | Win+X → Device Manager |
Network basics | Network & Internet | Settings → Network & Internet |
Local security | Local Security Policy | secpol.msc (Pro+) |
Local users/groups | lusrmgr.msc | Pro+ (not Home) |
Services | Services | services.msc |
Disk tasks | Disk Management | diskmgmt.msc |
Resource view | Task Manager | Ctrl+Shift+Esc |
Logs | Event Viewer | eventvwr.msc |
3) Windows command quickies
Task | Command | Notes |
---|
IP/DNS | ipconfig /all | Stack config |
Reachability | ping , tracert | Path/latency |
Name lookup | nslookup | DNS test |
Filesystem check | chkdsk /f | Fix errors (may require reboot) |
System files | sfc /scannow | Verify/repair protected files |
Image repair | DISM /Online /Cleanup-Image /RestoreHealth | Use before/after SFC |
Boot repair | bootrec /fixmbr bootrec /fixboot bootrec /rebuildbcd | WinRE |
Boot config | bcdedit | Edit boot entries |
Startup apps | taskmgr → Startup tab | Enable/disable |
Processes | tasklist , taskkill /PID n /F | CLI control |
Policy refresh | gpupdate /force | Pro+ |
4) Startup, recovery & reset
- Safe Mode: Shift+Restart → Troubleshoot → Advanced → Startup Settings.
- WinRE tools: Startup Repair, System Restore, Command Prompt, Uninstall Updates, UEFI Firmware Settings.
- System Restore: Roll back system files/registry (not documents).
- Reset this PC: Keep files vs remove everything; local vs cloud reinstall.
- MSConfig (legacy): Diagnostic/Selective startup; today prefer Task Manager + Services.
5) Disks, file systems & shares
- NTFS: permissions, quotas, EFS; exFAT for flash; FAT32 legacy.
- Share vs NTFS permissions: Effective = most restrictive. Share applies over network; NTFS local & network.
- Attributes: Read-only, Hidden, System; show via Folder Options.
- Map network drive: Explorer or
net use Z: \\server\share /user:DOMAIN\user
.
6) Accounts, UAC & permissions
- Local vs Microsoft accounts; Groups: Administrators, Users, Guests.
- UAC: prompts on elevation; keep at default or higher.
- Least privilege: standard user for daily tasks; elevate only when needed.
- Run as: Shift-right-click → Run as different user.
7) Security hardening (Windows)
- Updates: Windows Update automatic.
- Defender AV/Firewall: on by default; real-time + periodic scans.
- Firewall profiles: Domain, Private, Public; set correct network profile.
- BitLocker (Pro+): TPM + PIN for best protection; store recovery key safely.
- RDP: allow only when required; restrict via firewall, NLA, and groups.
- Account policies: lockout thresholds; password length/age (or passphrases + MFA).
8) Malware response (CompTIA order)
- Identify symptoms (pop-ups, slowdowns, unknown processes).
- Quarantine the system (isolate network, no file sharing).
- Disable System Restore (prevents re-infection from restore points).
- Remediate: update definitions, Safe Mode scan, remove malware; reimage if needed.
- Schedule scans / updates; enable System Restore.
- Create restore point.
- Educate the user (phishing, attachments, macros, downloads).
9) macOS essentials
Need | Tool | Path |
---|
System info | About This Mac | → About |
Activity | Activity Monitor | Applications → Utilities |
Disks | Disk Utility | Apps → Utilities |
Updates | System Settings → General → Software Update | |
Terminal | bash /zsh | Apps → Utilities |
- Time Machine backups; FileVault full-disk encryption; Keychain passwords/certs.
10) Linux essentials
- Package managers:
apt
, dnf
, yum
, pacman
. - Services:
systemctl status|start|stop <svc>
. - Network:
ip a
, ip r
, nmcli
, ping
, dig
. - Permissions:
chmod
, chown
, sudo
. - Logs:
/var/log
, journalctl
. - Editors:
nano
, vi
.
11) Mobile OS & MDM (Core 2 depth)
- iOS: Face ID/Touch ID, iCloud, Screen Time, profiles via MDM.
- Android: Google account, biometric unlock, app permissions, Work Profile.
- MDM controls: passcode policy, remote lock/wipe, app allow/deny, Wi-Fi/VPN profiles, certificate deployment.
- Secure comms: company portal apps, per-app VPN, device compliance checks.
12) Authentication & access
- Something you know/have/are; prefer MFA.
- Biometrics: Windows Hello, Touch ID, Android biometrics.
- Certificates/Smart cards in enterprise; 802.1X (awareness).
- SSO improves UX; still enforce least privilege.
13) Scripting basics (PowerShell, Bash, Python)
- PowerShell: objects,
Get-Command
, Get-Help
, Get-Service
, Get-Process
, pipes; run as admin. - Bash: shebang
#!/usr/bin/env bash
, variables, if
/for
, exit codes $?
. - Python: shebang,
venv
, pip
, simple file/OS tasks. - Task scheduling: Task Scheduler (Windows),
cron
/systemd timers
(Linux). - Safety: test in non-prod; log actions; parameterize paths; validate inputs.
14) Operational procedures
- Documentation: ticket notes, change records, asset tags, diagrams.
- Change management: request → assess risk → approvals → maintenance window → backout plan → comms.
- Incident response: identify → contain → eradicate → recover → lessons learned.
- SLAs/OLAs: response vs resolution targets; prioritize accordingly.
- Professionalism: active listening, empathy, avoid jargon, confirm resolution, follow-up.
15) Privacy, safety & disposal
- PII/PHI/PCI: handle on a need-to-know basis; encrypt at rest/in transit.
- Safety: ESD strap/mat, proper lifting, cable management, power off & unplug before service.
- Disposal: shred/drill platters, secure erase/crypto-erase SSDs, follow e-waste laws.
16) Quick pickers (scenario speed)
- App won’t start after update → Safe Mode, roll back/uninstall, Event Viewer,
sfc
/DISM
. - Slow login on domain → Network profile/Public firewall, DNS to domain controller, GPO processing.
- High CPU/Mem → Task Manager → sort by usage; check startup items/services.
- Disk 100% → Resource Monitor; check Superfetch/SysMain, updates, AV scan, SMART.
- Browser hijack → Extensions/add-ons, reset profile, DNS, hosts file, full malware workflow.
- Access denied → NTFS permissions vs share; ownership; run elevated.
- BitLocker prompt for key → Hardware change/TPM event; retrieve key from Azure AD/AD or printed copy.
How to use: If you hesitate on any row, convert it into a 2-bullet rule of thumb and drill a 20–25 question set on that topic tomorrow.