A Hybrid Cloud is a mix of these two types of clouds.
What is a mix of Public and Private clouds
This type of attack requires a carrier file to self-replicate
What is a virus
What is PGP (Pretty good privacy)
Cain and Abel
John the Ripper
Hashcat are examples of this kind of tool
What are password cracking software
The Caesar (ROT) cipher, shifts each letter to the left this many characters.
What is 8
IaaS Stands for this.
What is
(Infrastructure As A Service)
It is the strongest wireless signal encryption
What is WPA
A private signing key and a public verification key are pare of this.
What is Asymmetric key encryption
Daily Double
An event signaling an IDS to produce an alarm with no attack has taken place is classified as this
What is a false positive.
The following command
steghide extract -sf mary-lamb.jpg
What is decrypt the hidden messages stored inside the image mary-lamp.jpg
SaaS Stands for this in cloud computing
What is (Software As A Service)?
Continually bombarding a targeted network with fake requests is this
What is a DoS attack
Daily Double
For the WPA2 security standard, you should use 802.11(this letter)
What is 802.11i
Data Diddling, involves this to data before it is processed by the computer.
What is alter it.
The command
nslookup -type=mx starwars.com should return this type of MX values
What are "Preference =" values
PaaS Stands for
What is
(Platform As A Service)?
Daily Double
You need this to set up a wireless access point
What is SSID
Of the following this is NOT a type of virus:
Tunneling
Boot Sector
Macro
Wrapper
What is Wrapper
Ephemeral Data is
Data that is lost after disconnection or power down like RAM
It's the difference between these two commands:
echo "mclake234AOIjlwe;aoiealtna;lbvoinenser" > hash.txt
echo "mclake234AOIjlwe;aoiealtna;lbvoinenser" >> hash.txt
What is one creates the file if it does not already exist and overwrites the value
The other appends to the file if it exists
The key to cloud computing is delivery of services in this fashion.
What is On-Demand
Someone posing as an IT tech request information about your computer configuration.
What is Social Engineering. A phishing attach with human interaction
The two different types of network layer firewalls are this
What are stateful and stateless
Key Loggers are a types of this, beware 007!
What is Spyware
Daily Double!
Logging PowersShell execution and scripts is fundamental to Windows system administration and security. This is because.
What is; PowerShell, is most frequently used as a tool by attackers for gaining information and access to Windows enterprise environments
In this type of cloud, compute resources are a reserve for a single company or business. Here, the infrastructure is hosted and maintained on a company’s data center. The organization has total control over the hardware and services it provides.
Daily Double
What is Private Cloud
Aside from "host" it is the other type of intrusion prevention system
What is Network
It's the password hashing algorithm
What is MD4
Sections 66f of this Act, deals with Cyber terrorism
What is the IT Act
It is the difference between these two commands
cd .\home\SamCook
cd /home/SamCook
What is the top one is changing directories in a Windows environment while the later is changing directories in a Linux / Unix environment