Name a tool that is used for steganography
S-tool or Steghide
Which of the following passwords is more secure?
Phish4Fish or G3nCyb&r20
G3nCyb&r20
These 3 concepts are essential in cybersecurity as it provides vital security features, helps in avoiding compliance issues, ensures business continuity, and prevents reputational damage to the organization.
Confidentiality, Integrity, and Availability
This command shows you what is in your current directory (in Linux)
ls (List command)
This cipher involves using the Caesar Cipher multiple times
Vigenère cipher
What can you use to store your passwords?
Password manager
Your work's web server has gone done and now you cannot access the database you need to do your job
(What is this a violation of?)
Availability
This command displays the contents of a file
cat (Concatenate command)
This machine was used by the Germans in World War II to encrypt and decrypt messages?
The Enigma machine
What should you use before connecting to a public wifi connection?
VPN (Virtual Private Network)
An employee is required to prove that they have the proper security clearance before access is granted
Confidentiality
This directory in kali linux is where rockyou.txt is located.
/usr/share/wordlists
This is needed to encrypt plaintext to cipher text besides the encryption algorithm itself?
Key
This type of tool checks the "something that you are" to allow you access.
Biometrics
You are typing your login information while someone else is watching you type your password in
Confidentiality
This is the payload that is delivered from Attacker Kali to Windows 7
calc.exe
Which steps must be completed to extract data using S-tool?
Right click the image, then click reveal, then click passphrase, and then click save as
This type of geographical information is added to various forms of media in the form of metadata. One can control location settings in their devices so that others can or cannot track their whereabouts. What is this geographical metadata called?
Geotagging (Geolocation)
You are sending an email to one of your friends, a hacker intercepts the email and changes the message and then sends it to your friend
Integrity
Explain what this command does:
tshark -i # (Ethernet number) -c # (Number of packets) -w filename.pcap
It will scan on a specific ethernet number for a specific number of packets and then write all the captured data to the named file