What is Metadata?
Data about data
What do you do if there is not a secure alternative to a compromised system?
Either make one yourself or deal with it and hope nothing happens to you
How are wireless connections different from wired connections?
Direct or indirect connections such as radio transmissions
What is the command cat short for?
Concatenate
Which of the following tracks when permissions have been changed for particular users?
System Logs
What is Autopsy?
Allows forensics to examine a drive
As an individual whose data was compromised, what legal recourse do you have?
You can sue the company that put your information at risk
What was the original purpose of protocols like HTTP and FTP?
Protection
What command would show all packets?
tcpdump -nn
Which command can be used to test device availability?
What is a Backdoor Attack?
A backdoor is when a malicious user gains privileged access to the system by circumventing normal authentication processes.
Why would China want to stop encrypted internet traffic and make their citizens use outdated
methods?
So that the people can't see what is going on around the world
What is an Air Gap?
The middle ground between two different networks
What bias does social proof exploit?
Following a crowd
What is email metadata?
Any data besides the message itself
What is Command Injection?
Command Injection is the process to testing either different strings of code or commands on the server a website is hosted on
Are most flaws from a single line of code or a series of codes?
A single line of code
What is conditional access?
The process of testing the security state of devices and users prior to allowing access
Which command will overwrite a file with a random array of 1's and 0's?
Shred
What is used to encrypt voice/video flow?
AES
What is a Honeypot?
A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems
It's been used for so long that it is hard to change
What is the modus operandi for PAP?
Password Authentication Protocol
Which OS uses the FTK Imager?
Windows
What does WPA stand for?
Wifi Protected Access