Cybersecurity
Virtualization
Command line interface
CIA and AAA
100

The set of laws for use of cybersecurity

What are the Ten Commandments

100

the process of inputting a computer inside another computer to use the inputted computer's software, it comes without a large risk of messing with the main frame of your host also.

What is virtualization 

100

the terminal being put into use for coding and commands

Command line interface

100

Confidentiality Integrity, availability 

What are the three acronyms for CIA

200

Do not interfere with others work.

What is the second commandment

200

Enhanced security, low cost, disaster percentage lowered and able to fix if something goes wrong.

what are the benefits of using 

200

cd ~

what is the command to go home

200

Authentication, access control, accounting

what are the three A's of AAA

300

do not snoop in others files

what is the 3rd commandment

300

Windows 7 or kali linux

What is one OS you can use 

300

cd

what does change directory

400

Do not use your computer to steal 

what is commandment 4

400

salting 

Putting extra numbers on a password to protect from hackers

500

bearing false witness using your computer.

what is the 5th commandment

500

the code that moves something in your files. 

what does the code mv do.

M
e
n
u