Labs
Case Studies
Guided Notes
Quizzes
Miscellaneous
100

What is Metadata?

Data about data

100

What do you do if there is not a secure alternative to a compromised system?

Either make one yourself or deal with it and hope nothing happens to you

100

How are wireless connections different from wired connections?

Direct or indirect connections such as radio transmissions

100

What is the command cat short for?

Concatenate

100

Which of the following tracks when permissions have been changed for particular users?

System Logs

200

What is Autopsy?

Allows forensics to examine a drive

200

As an individual whose data was compromised, what legal recourse do you have?

You can sue the company that put your information at risk

200

What was the original purpose of protocols like HTTP and FTP?

Protection

200

What command would show all packets?

tcpdump -nn

200

Which command can be used to test device availability?

Ping
300

What is a Backdoor Attack?

A backdoor is when a malicious user gains privileged access to the system by circumventing normal authentication processes.

300

Why would China want to stop encrypted internet traffic and make their citizens use outdated
methods?

So that the people can't see what is going on around the world

300

 What is an Air Gap?

The middle ground between two different networks

300

What bias does social proof exploit?

Following a crowd

300

What is email metadata?

Any data besides the message itself

400

What is Command Injection?

Command Injection is the process to testing either different strings of code or commands on the server a website is hosted on

400

Are most flaws from a single line of code or a series of codes?

A single line of code

400

What is conditional access?

The process of testing the security state of devices and users prior to allowing access

400

Which command will overwrite a file with a random array of 1's and 0's?

Shred

400

What is used to encrypt voice/video flow?

AES

500

What is a Honeypot?

A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems

500
  • Why is MS-CHAPv2 still used if there have been numerous vulnerabilities since 2007?

It's been used for so long that it is hard to change

500

What is the modus operandi for PAP?

Password Authentication Protocol

500

Which OS uses the FTK Imager?

Windows

500

What does WPA stand for?

Wifi Protected Access

M
e
n
u