Raspberry Pi Programming
Python is a ________ - based programming language.
What is text?
The English name of the binary number 1011.
What is eleven (11)?
Name the intrusive software that is designed to damage and destroy computers and computer systems.
What is Malware?
What is the name of the website that contains information on vulnerabilities and instructions on how to exploit them? (full website address)
What is https://exploit-db.com?
It is a flaw or glitch in a system.
What is Bug?
This type of cryptographic key can be posted for everyone to see, even Oscar, and still be secure enough for Ann and Bob to use.
What is a public key?
Name a malicious program that uses a computer network to replicate.
What is Worm?
The LHOST stand for _________ ___________.
What is Local Host?
The set of rules that define the structure of a language.
What is Syntax?
The binary representation of the number twenty-one.
What is 10101?
Name the attackers who lacks knowledge necessary to perform attack on their own.
Who are Script Kiddies?
Name the tool would you use to exploit a target machine.
What is Metasploit?
It is a value that changes depending on the data and information the specific program receives.
What is Variable?
This elementary school level math problem is crucial for the security of modern cryptography on the Internet.
What is factoring a number?
This is when the attacker tries every possible combination of letters, numbers, and characters to figure out a password.
What is Brute Force Attack?
You will use this command to launch Metasploit on a Kali machine.
What is msfconsole?
The set of instructions a program will follow to do A then B and then C.
What is Algorithm?
Decrypt OORELH using a Vigenere cipher with keyword BAD.
What is "noodle"?
A type of malicious software designed to block access to a computer system until a sum of money is paid.
What is ransomware?
Name four ethical hacking steps.
Are these the steps of ethical hacking includes Reconnaissance, Scanning, Exploitation, and Maintaining Access?