Steganography
Cryptography
Cyber hygiene
GenCyber Concepts
Kali Linux
100
Name a tool used for steganography

S-tool or Steghide

100

Cryptography is known for its “secret writing”. What technique is used to hide information?

Encryption

100

Should you use the same password between multiple accounts?

No

100

What is the concept where information, an information system or a component of a system has not been modified in an unauthorized manner.

Integrity
100

How do you create new users in Kali/Linux systems?

useradd

200

What is -ef stand for?

Embed file

200

What is the term used for information that is sent with encryption?

Ciphertext

200

You receive a random email from your bank asking for you to use the link to "get your money now!"

Phishing

200

What is the comprehensive strategy of including multiple layers of security within a system so that if one layer fails, another layer of security is in place to stop an attack or unauthorized acces

Defense in Depth

200
how do you change the permissions of a file?

chmod

300

What does -cf stand for?

Cover file

300

What machine was used by the Germans in World War II to encrypt and decrypt messages?

The Enigma machine

300

In order to make your computer/devices more secure, these periodically get released

System updates

300

What is the property that information, an information system or a component of a system has not been modified in an unauthorized manner.

Keep it Simple

300

what are the octal values for read, write, and execute?

4, 2, 1

400

What does steghide --help do?

The steghide help menu / the options

400

To encrypt plaintext to ciphertext, what is needed besides an encryption algorithm?

Key

400

When you log in, you have to accept a confirmation token on your phone in addition to using your password

Multi-factor authentication (something you own, something you know)

400


Example: For a GenCyber camper to work on virtual machines in ODU MOVE, you first need GenCyber instructors to open an account for you, then you need to log in as a regular user to use the VMs and applications and tools on VMs. You need to have administrator privilege to manage user accounts.Which concept is this?

Defense in Depth

400

What is the_____ file that is used by JtR to crack password?

dictionary file or rockyou.txt

500

How do you extract from s-tool?

Right click, then click reveal, click passphrase, and then click save as

500

I collect, preserve, analyze, and present technical evidence for law enforcement, what am I?

Computer forensics

500

What should you use before you connect to public wifi?

VPN (Virtual Private Network)

500

Which 3 GenCyber concepts ALSO encompass the CIA triad?

Confidentiality, Availability, and Integrity
500

Explain the octal file permission set of "750"

user has read write and execute, group has execute and write, and everyone else has no permissions

M
e
n
u