<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://legacyimpactclassroom.net/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/history-types-of-computers-true-false-10/</loc><lastmod>2025-09-04T23:07:54+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/history-types-of-computers-set-b-10-mcqs/</loc><lastmod>2025-09-04T23:07:34+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/history-types-of-computers-set-a-10-mcqs/</loc><lastmod>2025-09-04T23:07:07+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/basic-computer-architecture-mcq-set-a-10/</loc><lastmod>2025-09-01T05:24:31+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/basic-computer-architecture-mcq-set-b-10/</loc><lastmod>2025-09-01T05:25:04+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/basic-computer-architecture-mcq-set-c-10/</loc><lastmod>2025-09-01T05:25:28+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/basic-computer-architecture-true-false-10/</loc><lastmod>2025-09-01T05:25:50+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/internal-components-true-false-10/</loc><lastmod>2025-09-01T05:27:26+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/internal-components-mcq-set-b-10/</loc><lastmod>2025-09-01T05:28:50+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/internal-components-mcq-set-a-10/</loc><lastmod>2025-09-01T05:28:28+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/laptops-vs-desktops-true-false-10/</loc><lastmod>2025-09-01T05:47:49+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/laptops-vs-desktops-mcq-set-b-10/</loc><lastmod>2025-09-01T05:48:02+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/laptops-vs-desktops-mcq-set-a-10/</loc><lastmod>2025-09-01T05:20:45+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/external-peripherals-true-false-10/</loc><lastmod>2025-09-01T05:35:55+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/external-peripherals-mcq-set-b-10/</loc><lastmod>2025-09-01T05:36:24+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/external-peripherals-mcq-set-a-10/</loc><lastmod>2025-09-01T05:36:54+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/tools-for-computer-hardware-repair-true-false-10/</loc><lastmod>2025-09-01T06:18:08+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/tools-for-computer-hardware-repair-mcq-set-b-10/</loc><lastmod>2025-09-01T06:18:38+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/tools-for-computer-hardware-repair-mcq-set-a-10/</loc><lastmod>2025-09-01T06:19:12+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/esd-safety-anti-static-precautions-true-false-10/</loc><lastmod>2025-09-01T06:35:42+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/esd-safety-anti-static-precautions-mcq-set-b-10/</loc><lastmod>2025-09-01T06:36:09+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/esd-safety-anti-static-precautions-mcq-set-a-10/</loc><lastmod>2025-09-01T06:36:57+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware__trashed/quizzes/identification/</loc><lastmod>2025-09-01T07:01:01+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/history-types-of-computers-true-false-10-2/</loc><lastmod>2025-09-07T14:45:28+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/history-types-of-computers-set-a-10-mcqs-2/</loc><lastmod>2025-09-07T14:46:05+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/history-types-of-computers-set-b-10-mcqs-2/</loc><lastmod>2025-09-07T14:46:30+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/basic-computer-architecture-true-false-10-2/</loc><lastmod>2025-09-07T14:49:31+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/basic-computer-architecture-mcq-set-a-10-2/</loc><lastmod>2025-09-07T14:49:55+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/basic-computer-architecture-mcq-set-b-10-2/</loc><lastmod>2025-09-07T14:50:17+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/basic-computer-architecture-mcq-set-c-10-2/</loc><lastmod>2025-09-07T14:50:47+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/internal-components-true-false-10-2/</loc><lastmod>2025-09-07T14:54:00+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/internal-components-mcq-set-a-10-2/</loc><lastmod>2025-09-07T14:54:18+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/internal-components-mcq-set-b-10-2/</loc><lastmod>2025-09-07T14:54:31+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/external-peripherals-true-false-10-2/</loc><lastmod>2025-09-07T14:57:47+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/external-peripherals-mcq-set-a-10-2/</loc><lastmod>2025-09-07T14:57:52+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/external-peripherals-mcq-set-b-10-2/</loc><lastmod>2025-09-07T14:58:16+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/laptops-vs-desktops-true-false-10-2/</loc><lastmod>2025-09-07T15:00:45+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/laptops-vs-desktops-mcq-set-a-10-2/</loc><lastmod>2025-09-07T15:00:54+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/laptops-vs-desktops-mcq-set-b-10-2/</loc><lastmod>2025-09-07T15:01:09+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/tools-for-computer-hardware-repair-true-false-10-2/</loc><lastmod>2025-09-07T15:03:18+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/tools-for-computer-hardware-repair-mcq-set-a-10-2/</loc><lastmod>2025-09-07T15:03:37+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/tools-for-computer-hardware-repair-mcq-set-b-10-2/</loc><lastmod>2025-09-07T15:03:52+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/esd-safety-anti-static-precautions-true-false/</loc><lastmod>2025-09-07T15:04:59+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/esd-safety-anti-static-precautions-set-a/</loc><lastmod>2025-09-07T15:05:13+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/esd-safety-anti-static-precautions-set-b/</loc><lastmod>2025-09-07T15:05:29+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/john-maxwells-15-laws-of-invaluable-growth/quizzes/the-law-of-intentionality-set-a-10-mcqs/</loc><lastmod>2025-09-08T15:04:27+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/john-maxwells-15-laws-of-invaluable-growth/quizzes/the-law-of-intentionality-set-b-10-mcqs/</loc><lastmod>2025-09-08T15:09:41+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/john-maxwells-15-laws-of-invaluable-growth/quizzes/the-law-of-awareness-set-a-10-mcqs/</loc><lastmod>2025-09-08T14:53:49+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/john-maxwells-15-laws-of-invaluable-growth/quizzes/the-law-of-awareness-set-b-10-mcqs/</loc><lastmod>2025-09-08T14:59:28+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/john-maxwells-15-laws-of-invaluable-growth/quizzes/the-law-of-the-mirror-set-a-10-mcqs/</loc><lastmod>2025-09-08T15:32:31+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/john-maxwells-15-laws-of-invaluable-growth/quizzes/the-law-of-the-mirror-set-b-10-mcqs/</loc><lastmod>2025-09-08T15:37:44+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/quit/</loc><lastmod>2023-03-14T03:44:26+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/quiz-conversion/</loc><lastmod>2022-10-11T11:10:27+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/quiz-rule-1-4/</loc><lastmod>2022-12-19T12:38:59+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/quiz-subnetting/</loc><lastmod>2022-10-10T15:02:02+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/ip-addressing-quiz/</loc><lastmod>2022-10-08T12:18:31+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/initial-config-quiz/</loc><lastmod>2023-03-14T03:46:10+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/lan-switching/</loc><lastmod>2023-03-14T03:47:21+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/static-routing-quiz/</loc><lastmod>2023-03-14T03:48:10+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/ospf-quiz/</loc><lastmod>2022-12-06T10:16:16+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/routing/</loc><lastmod>2023-03-14T03:48:48+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/access-list-control-quiz/</loc><lastmod>2023-03-14T03:49:22+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/nat-quiz/</loc><lastmod>2023-03-14T03:49:46+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/ipv6-quiz/</loc><lastmod>2023-03-14T03:50:15+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cisco-certified-network-associate-ccna-200-301/quizzes/ipsec-quiz/</loc><lastmod>2023-03-14T03:50:59+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/malware-and-security-terminologies/</loc><lastmod>2025-11-02T05:47:25+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/malware-and-security-terminologies-2/</loc><lastmod>2025-11-02T05:47:48+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/malware-and-security-terminologies-3/</loc><lastmod>2025-11-02T05:48:08+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/malware-and-security-terminologies-continued/</loc><lastmod>2025-11-02T05:48:33+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/malware-and-security-terminologies-continued-2/</loc><lastmod>2025-11-02T05:48:46+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/malware-and-security-terminologies-continued-3/</loc><lastmod>2025-11-02T05:48:58+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-concepts/</loc><lastmod>2025-11-01T05:22:25+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-operations-iam-endpoint-security/</loc><lastmod>2025-11-01T05:22:59+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-operations-application-network-security/</loc><lastmod>2025-11-01T05:23:19+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-operations-detection-response/</loc><lastmod>2025-11-01T05:23:39+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-fundamentals-aaa-security-controls/</loc><lastmod>2025-11-02T05:51:54+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-fundamentals-zero-trust-gap-analysis/</loc><lastmod>2025-11-02T05:52:11+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/physical-security-fencing-barriers-locks/</loc><lastmod>2025-11-02T05:52:41+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/physical-security-surveillance-environment/</loc><lastmod>2025-11-02T05:52:54+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/physical-security-brute-force-access-control/</loc><lastmod>2025-11-02T05:53:07+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/social-engineering-phishing-communication-attacks/</loc><lastmod>2025-11-02T05:54:01+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/social-engineering-physical-psychological-manipulation/</loc><lastmod>2025-11-02T05:54:14+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/social-engineering-mitigation-awareness/</loc><lastmod>2025-11-02T05:54:27+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/data-protection-classification-data-states/</loc><lastmod>2025-11-02T05:55:47+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/data-protection-data-sovereignty-securing-data/</loc><lastmod>2025-11-02T05:56:05+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/cryptography-quiz-set-1/</loc><lastmod>2025-11-02T05:56:32+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/cryptography-quiz-set-2/</loc><lastmod>2025-11-02T05:56:44+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/cryptography-quiz-set-3/</loc><lastmod>2025-11-02T05:56:55+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/third-party-vendor-risk-quiz-set-1/</loc><lastmod>2025-11-02T05:58:26+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/third-party-vendor-risk-quiz-set-2/</loc><lastmod>2025-11-02T05:58:37+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-infrastructure-part-1-ports-protocols-firewalls/</loc><lastmod>2025-12-05T19:26:00+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-infrastructure-part-2-ids-ips-network-appliances-port-security/</loc><lastmod>2025-12-05T19:26:29+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-infrastructure-part-3-securing-communications-sd-wan-sase-selecting-controls/</loc><lastmod>2025-12-05T19:27:06+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/risk-management-part-1-foundations-assessment-security-style/</loc><lastmod>2025-11-26T08:30:28+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/risk-management-part-2-bia-bcp-compliance-third-party-security-style/</loc><lastmod>2025-11-26T08:30:44+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/risk-management-part-3-controls-treatment-monitoring-governance-security-style/</loc><lastmod>2025-11-26T08:30:58+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-os-and-software-installations-part-1/</loc><lastmod>2025-11-26T09:03:24+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-os-and-software-installations-part-2/</loc><lastmod>2025-11-26T09:03:55+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-os-and-software-installations-part-3/</loc><lastmod>2025-11-26T09:04:26+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-computer-maintenance-and-troubleshooting-part-1/</loc><lastmod>2025-11-26T09:55:00+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-computer-maintenance-and-troubleshooting-part-2/</loc><lastmod>2025-11-26T09:55:33+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-computer-maintenance-and-troubleshooting-part-3/</loc><lastmod>2025-11-26T09:56:05+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-basic-networking-part-1/</loc><lastmod>2025-11-26T10:16:10+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-basic-networking-part-2/</loc><lastmod>2025-11-26T10:16:40+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-basic-networking-part-3/</loc><lastmod>2025-11-26T10:17:14+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-laptop-specific-repair-part-1/</loc><lastmod>2025-11-26T10:33:05+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-laptop-specific-repair-part-2/</loc><lastmod>2025-11-26T10:33:31+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-laptop-specific-repair-part-3/</loc><lastmod>2025-11-26T10:34:02+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/vulnerabilities-attacks-part-1-hardware-bluetooth-mobile-security-style/</loc><lastmod>2025-11-28T06:34:27+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/vulnerabilities-attacks-part-2-web-attacks-injection-xss-csrf-security-style/</loc><lastmod>2025-11-28T06:34:57+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/vulnerabilities-attacks-part-3-zero-day-os-memory-bugs-race-conditions-security-style/</loc><lastmod>2025-11-28T06:35:36+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/malicious-activities-part-1-ddos-dns-on-path-attacks-security-style/</loc><lastmod>2025-11-28T06:53:39+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/malicious-activities-part-2-traversal-injection-replay-sessions-security-style/</loc><lastmod>2025-11-28T06:54:26+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/malicious-activities-part-3-execution-escalation-iocs-security-style/</loc><lastmod>2025-11-28T06:54:59+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-storage-and-data-recovery-part-1/</loc><lastmod>2025-11-28T07:10:43+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-storage-and-data-recovery-part-2/</loc><lastmod>2025-11-28T07:11:12+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-storage-and-data-recovery-part-3/</loc><lastmod>2025-11-28T07:11:36+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-printer-and-peripheral-troubleshooting-part-1/</loc><lastmod>2025-11-28T07:20:26+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-printer-and-peripheral-troubleshooting-part-2/</loc><lastmod>2025-11-28T07:21:10+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-printer-and-peripheral-troubleshooting-part-3/</loc><lastmod>2025-11-28T07:22:32+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-virtualization-and-containerization-part-1/</loc><lastmod>2025-11-28T21:00:01+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-virtualization-and-containerization-part-2/</loc><lastmod>2025-11-28T21:00:30+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-virtualization-and-containerization-part-3/</loc><lastmod>2025-11-28T21:01:00+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-cloud-computing-part-1/</loc><lastmod>2025-11-28T21:12:52+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-cloud-computing-part-2/</loc><lastmod>2025-11-28T21:13:39+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-cloud-computing-part-3/</loc><lastmod>2025-11-28T21:14:32+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-security-best-practices-part-1/</loc><lastmod>2025-11-28T21:31:39+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-security-best-practices-part-2/</loc><lastmod>2025-11-28T21:32:07+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/computer-hardware/quizzes/comptia-a-security-best-practices-part-3/</loc><lastmod>2025-11-28T21:32:43+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/assets-change-management-part-1-acquisition-procurement-mobile-deployment-security-style/</loc><lastmod>2025-12-03T06:03:11+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/assets-change-management-part-2-asset-management-disposal-decommissioning-security-style/</loc><lastmod>2025-12-03T06:03:42+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/assets-change-management-part-3-change-management-documentation-security-style/</loc><lastmod>2025-12-03T06:05:19+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/governance-compliance-part-1-governance-policies-standards-procedures-security-style/</loc><lastmod>2025-12-03T06:14:00+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/governance-compliance-part-2-compliance-privacy-governance-considerations-security-style/</loc><lastmod>2025-12-03T06:14:32+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/governance-compliance-part-3-audits-risk-continuous-compliance-security-style/</loc><lastmod>2025-12-03T06:15:12+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-policies-procedures-part-1-policy-hierarchy-governance-security-style/</loc><lastmod>2025-12-03T06:23:32+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-policies-procedures-part-2-operational-procedures-security-style/</loc><lastmod>2025-12-03T06:24:03+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-policies-procedures-part-3-program-operations-compliance-security-style/</loc><lastmod>2025-12-03T06:24:43+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/audit-assessments-part-1-internal-audit-internal-assessments-security-style/</loc><lastmod>2025-12-03T08:33:00+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/audit-assessments-part-2-external-audit-soc-iso-pci-attestation-security-style/</loc><lastmod>2025-12-03T08:33:32+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/audit-assessments-part-3-penetration-testing-recon-attestation-of-findings-security-style/</loc><lastmod>2025-12-03T08:34:02+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-architecture-part-1-on-prem-vs-cloud-virtualization-containers-security-style/</loc><lastmod>2025-12-03T08:56:44+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-architecture-part-3-iot-ics-scada-embedded-systems-security-style/</loc><lastmod>2025-12-03T08:56:15+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-architecture-part-3-iot-ics-scada-embedded-systems-security-style-2/</loc><lastmod>2025-12-03T08:55:44+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/hardening-part-1-defaults-unnecessary-services-app-restrictions-security-style-corrected/</loc><lastmod>2025-12-05T20:10:00+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/hardening-part-2-trusted-os-patching-updates-group-policies-security-style-corrected/</loc><lastmod>2025-12-05T20:13:49+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/hardening-part-3-selinux-encryption-levels-secure-baselines-security-style-corrected/</loc><lastmod>2025-12-05T20:17:21+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-techniques-part-1-wireless-security-nac-secure-protocols-security-style/</loc><lastmod>2025-12-05T20:31:56+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-techniques-part-2-application-security-web-dns-filtering-secure-protocols-security-style/</loc><lastmod>2025-12-05T20:32:59+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-techniques-part-3-email-security-edr-ueba-secure-protocols-security-style/</loc><lastmod>2025-12-05T20:33:40+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/cyber-resilience-redundancy-part-1-ha-data-redundancy-raid-power-security-style-corrected/</loc><lastmod>2025-12-05T20:51:35+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/cyber-resilience-redundancy-part-2-capacity-planning-continuity-operations-security-style-corrected/</loc><lastmod>2025-12-05T20:52:13+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/cyber-resilience-redundancy-part-3-redundant-sites-resilience-recovery-testing-security-style-corrected/</loc><lastmod>2025-12-05T20:53:05+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/identity-access-management-part-1-authentication-mfa-sso-aaa-security-style-corrected/</loc><lastmod>2025-12-06T00:00:18+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/identity-access-management-part-2-authorization-rbac-abac-pam-lifecycle-security-style-corrected/</loc><lastmod>2025-12-06T00:01:29+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/identity-access-management-part-3-federation-cloud-iam-tokens-auditing-security-style-corrected/</loc><lastmod>2025-12-06T00:02:23+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/vulnerability-management-part-1-identify-disclosure-analyze-security-style/</loc><lastmod>2025-12-06T08:03:07+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/vulnerability-management-part-2-scanning-assessing-results-security-style/</loc><lastmod>2025-12-06T08:04:14+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/vulnerability-management-part-3-response-remediation-reporting-security-style/</loc><lastmod>2025-12-06T08:05:24+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/alerting-monitoring-part-1-resources-alerting-basics-smtp-security-style/</loc><lastmod>2025-12-06T08:15:03+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/alerting-monitoring-part-2-siem-scap-netflow-tool-telemetry-security-style/</loc><lastmod>2025-12-06T08:17:04+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/alerting-monitoring-part-3-operations-single-pane-of-glass-governance-security-style/</loc><lastmod>2025-12-06T08:17:37+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/incident-report-response-part-1-ir-process-evidence-reporting-security-style/</loc><lastmod>2025-12-06T08:27:57+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/incident-report-response-part-2-threat-hunting-security-style/</loc><lastmod>2025-12-06T08:29:00+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/incident-report-response-part-3-rca-training-testing-digital-forensics-security-style/</loc><lastmod>2025-12-06T08:29:59+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/investigating-an-incident-part-1-data-dashboards-reports-metadata-security-style/</loc><lastmod>2025-12-10T05:31:51+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/investigating-an-incident-part-2-pcap-firewall-ids-ips-network-logs-security-style/</loc><lastmod>2025-12-10T05:31:22+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/investigating-an-incident-part-3-vuln-scans-app-endpoint-os-logs-correlation-security-style/</loc><lastmod>2025-12-10T05:29:56+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/automation-orchestration-part-1-when-why-benefits-ticketing-governance-security-style/</loc><lastmod>2025-12-10T05:46:04+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/automation-orchestration-part-2-support-tickets-onboarding-security-automation-security-style/</loc><lastmod>2025-12-10T05:44:53+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/automation-orchestration-part-3-devsecops-integration-apis-security-style/</loc><lastmod>2025-12-10T05:43:26+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-awareness-part-1-insider-threats-social-engineering-security-style/</loc><lastmod>2025-12-10T05:54:34+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-awareness-part-2-password-management-mfa-security-style/</loc><lastmod>2025-12-10T05:55:03+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/security-awareness-part-3-policy-remote-hybrid-culture-of-security-security-style/</loc><lastmod>2025-12-10T05:55:34+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/network-fundamentals-part-1-osi-model-security-style/</loc><lastmod>2025-12-10T06:04:56+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/network-fundamentals-part-2-encapsulation-protocol-basics-security-style/</loc><lastmod>2025-12-10T06:09:50+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/network-fundamentals-part-3-basic-ip-addressing-simple-networks-security-style/</loc><lastmod>2025-12-10T06:11:08+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-1-quiz-part-1/</loc><lastmod>2026-02-10T12:34:05+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-1-quiz-part-2/</loc><lastmod>2026-02-10T13:14:44+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-2-quiz-part-1/</loc><lastmod>2026-02-26T22:28:54+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-2-quiz-part-2/</loc><lastmod>2026-02-26T22:31:04+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-3-quiz-part-1/</loc><lastmod>2026-03-01T05:36:50+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-3-quiz-part-1-2/</loc><lastmod>2026-03-01T05:45:15+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-3-quiz-part-2/</loc><lastmod>2026-03-01T05:50:18+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-4-quiz-part-1/</loc><lastmod>2026-03-01T05:58:56+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-4-quiz-part-2/</loc><lastmod>2026-03-01T06:01:34+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-5-quiz-part-1/</loc><lastmod>2026-03-01T06:06:23+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-5-quiz-part-2/</loc><lastmod>2026-03-01T06:07:52+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-6-quiz-part-1/</loc><lastmod>2026-03-01T06:13:06+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-6-quiz-part-2/</loc><lastmod>2026-03-01T06:14:40+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-7-quiz-part-1/</loc><lastmod>2026-03-01T06:20:27+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-7-quiz-part-2/</loc><lastmod>2026-03-01T06:21:00+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-8-quiz-part-1/</loc><lastmod>2026-03-01T06:25:59+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-8-quiz-part-2/</loc><lastmod>2026-03-01T06:26:51+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-9-mock-exam-part-1/</loc><lastmod>2026-03-01T06:29:19+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/splunk-poweruser-and-kali-linux/quizzes/splunk-core-user-module-9-mock-exam-part-2/</loc><lastmod>2026-03-01T06:30:18+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-1-part-1/</loc><lastmod>2026-03-02T05:27:18+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-2-installing-configuring/</loc><lastmod>2026-03-02T05:31:48+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-3-linux-fundamentals-part-1/</loc><lastmod>2026-03-02T05:36:48+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-3-linux-fundamentals-part-2/</loc><lastmod>2026-03-02T05:39:19+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-4-networking-fundamentals-part-1/</loc><lastmod>2026-03-02T17:15:51+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-4-networking-fundamentals-part-2/</loc><lastmod>2026-03-02T17:16:04+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-5-reconnaissance-part-1/</loc><lastmod>2026-03-02T17:15:17+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-5-reconnaissance-part-2/</loc><lastmod>2026-03-02T17:15:30+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-6-scanning-enumeration-part-1/</loc><lastmod>2026-03-02T17:14:46+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-6-scanning-enumeration-part-2/</loc><lastmod>2026-03-02T17:14:56+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-7-vulnerability-analysis-part-1/</loc><lastmod>2026-03-02T17:14:19+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-7-vulnerability-analysis-part-2/</loc><lastmod>2026-03-02T17:14:30+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-8-exploitation-techniques-part-1/</loc><lastmod>2026-03-02T16:52:43+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-8-exploitation-techniques-part-2/</loc><lastmod>2026-03-02T16:53:12+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-9-post-exploitation-part-1/</loc><lastmod>2026-03-02T17:11:18+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-9-post-exploitation-part-2/</loc><lastmod>2026-03-02T17:11:32+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-10-web-app-pentesting-part-1/</loc><lastmod>2026-03-02T17:10:37+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-10-web-app-pentesting-part-2/</loc><lastmod>2026-03-02T17:10:53+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-11-wireless-password-attacks-part-1/</loc><lastmod>2026-03-02T17:09:24+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-11-wireless-password-attacks-part-2/</loc><lastmod>2026-03-02T17:09:52+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-12-scripting-part-1/</loc><lastmod>2026-03-02T17:13:33+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/kali-linux-penetration-testing/quizzes/kali-linux-module-12-reporting-final-project-part-2/</loc><lastmod>2026-03-02T17:13:56+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/networking-fundamentals-security-style/</loc><lastmod>2026-04-09T09:22:42+00:00</lastmod></url><url><loc>https://legacyimpactclassroom.net/courses/cyber-security/quizzes/cyber-security-mixed-quiz-malware-threat-actors-threat-intelligence-risk-iam/</loc><lastmod>2026-04-09T09:14:40+00:00</lastmod></url></urlset>
