What is the smallest unit of communication that happens over a network?
Command to show the directory you're in
pwd
GUI stands for ___________ User Interface
Graphical
What does DDoS stand for, and what is it?
Distributed Denial of Service: cause a site to crash by flooding it with traffic
Hexadecimal is base ____
16
Name somewhere where networking shows up outside of the internet.
GPS, Bluetooth, Apple Pay, cell towers
What information can you get from the "file" command?
The type of the file passed in (like text, code, binary, etc)
In Linux it's not called a folder, it's called a:
Directory
How does a VPN help prevent attacks?
Creates a "tunnel" through which you communicate, so nobody can see your actual traffic. Also just makes your IP and identity harder to find
What is "virtualization"?
Running an operating system on top of another operating system
What does a router do?
Directs traffic around and in/out of a network
How do you learn more detailed information about what a command can do?
Read the manual page! man [command]
SOHO Network
Small Office/Home Office
What's a "backdoor"?
A built-in way to gain access to a system that isn't yours
11
What's the difference between a node and a host?
Node is connected but not necessarily active - host has a user and transmits information
What is the output of "ip a"?
Internet interfaces, connections, and status
MFA
Multi-Factor Authentication
Why might a business not reveal that it has fallen victim to a cybersecurity incident?
Loss of profits/investors, the attack might not be over, the exploit might not be fixed yet
What's a hash function?
Order from smallest to largest:
MAN, PAN, LAN, WAN
PAN, LAN, MAN, WAN
What symbol does a "pipe" use and what does it do?
| (vertical bar), sends output of one command as input to another
(tough one!!)
bash
bourne-again shell (the language that our terminal commands run in)
What role does encryption play in preventing attacks over a network?
Garbles your traffic over an internet connection so that nobody can intercept and read your packets
What are the three classifications of data in enterprise security?
Data at rest, in transit, and in use