This is the term for a machine/computer that does not exist physically
What is a virtual machine?
Wireshark and Tshark are used to carry out this process
This account in Linux is also known as the superuser
What is root/the root account
This application is used to scan networks for information such as open ports and host information.
What is Nmap
You caught your coworker at your boss' desk, looking at documents they were not authorized to see.
What aspect of the CIA Triad has been violated here?
What is confidentiality
Alice and Bob use one secret key to encrypt their messages they send to each other. They are demonstrating this kind of encryption/cryptography
Private key
True/False: Passwords are harder to crack when they are shorter and have less variety of characters used
John is a penetration tester for a company. After completing his penetration test, he gives a report to the company detailing their vulnerabilities which they then use to secure their systems further. John is an example of what?
What is a white hat hacker?
We hid adventureland.txt inside octopus.bmp. Hiding files within other files is the definition for this.
What is steganography.
When data is sent across a network, it is broken into pieces called this.
What are packets?
Name each of these permission types and their corresponding octal value
R
W
X
Read - 4
Write - 2
eXecute - 1