What are the 3 items that represent the CIA triad?
1. Integrity
2. Confidentiality
3. Availability
A __________ is the device that is requesting information or services from a server on a network.
client
Name that Malware:
"Annoying software that advertises products and services all over the system"
Adware
What is the difference between a file and a directory?
Directories can contain other files and directories, files cannot
What does the command ls -l do?
Lists the contents of the directory
The scanning phase of ethical hacking is important because it _______
Determines what software is running on the system that may be vulnerable
A ___________ is a network device that controls and filters data between networks, either wired or wireless.
router
Name that malware:
"Holds a victim’s data hostage until a payment is received"
Ransomware
rm file does which of the following?
remove file
When I use mv, I am ______
Moving or renaming files
__________ refers to the action of watching and analyzing network traffic at the packet level.
packet sniffer
Which CIA category represents this scenario: Involves the efforts of an organization to make sure data is kept secret or private.
confidentiality
Name that malware:
"Software that listens to user activity on a system"
Spyware
When I use mv, I am ______
Moving or renaming files
What does cd stands for ?
Change directory
A Wireshark data capture file that contains packet information of network traffic is called __________.
pcap file
A Denial of Service (DoS) or Distributed Denial of Service (DDoS) attack compromises which item in the CIA triad?
Availability
Name that malware:
"A piece of code that attaches itself to a system process, file, etc…"
Virus
What command would you use to forcefully shut down a process?
kill
What does cat file do?
prints all contents of file
The attacker spoofs the IP address DNS entries for a target website on a given DNS server and replaces them with the IP address under their control. This compromises which item in the CIA triad?
Integrity
________ is a part of a process or system that is seen by the user and typically provides functionality to the user.
Front-end
Name that malware:
"A virus that can self-replicate on a system or network"
Worm
cd stands for _____
Change directory
What is the command for administrator that allows root access?
Sudo