What does the A in CIA Triad stand for?
Availability
This command will show files in a directory
ls
This animal was encrypted using Caesar Cipher with a key of 2. What is the animal?
ciphertext = FQI
dog
A byte is ____ bits
8
A MAC address is a _______ address
physical
Bob discovers that he has the ability to modify the lunch menu posted on his school’s website. He edits the website. What part of the CIA Triad does this affect?
Integrity
What is -2 mod 6?
4
The same key being shared by both users is known as:
symmetric encryption
What are the two numbers we use in binary?
0 and 1
Which protocol checks to see if all packets have been received?
TCP
Alice is checking her grades and forgets to log out before she leaves. Bob gets on the computer, and he sees her grades. What part of the CIA Triad does this affect?
Confidentiality
What is 32 mod 3?
2
In an asymmetric encryption method, the sender uses the _________ key to encrypt the message.
public
Convert the number 20 to binary (write as a byte)
00010100
What is the difference between HTTP and HTTPS?
encryption
What command will make a new directory called NewDirectory?
mkdir NewDirectory
Who was the lead of the group that cracked Enigma?
Alan Turing
In asymmetric encryption the receiver uses the ___________ key to decrypt
private
What is hex value AB in decimal?
171
What is the name of the layer of the OSI model is responsible for addressing the data with IP addresses?
Network
What command will show you the current directory you are in?
pwd
What is the weakest link in the security chain?
One commonly used asymmetric encryption method is known as:
Hint: We did a worksheet on this in class
RSA
What is the hex value E in decimal?
14
Layer 2 or Data Link Layer