software that is meant to intentionally harm a device or network
What is malware?
changing directories
What is cd?
determines path of a packet to reach a destination
What is traceroute?
when passwords have the same hash (may also PARTIALLY have the same hash)
What is a collision?
an example of a secure protocol
a phishing attack directed at a specific person or group
What is spear phishing?
lists out files in the current directory
What is ls?
command that overwrites a binary file with random 1s and 0s
What is shred?
this is added to a password before hashing to increase security
What is salt?
does not store an entered username or password
What is single sign on?
different ways to defend a system from malware
What are firewalls, anti-virus software, checking files and downloading sources?
displays the text of a file
What is cat?
programs to permanently delete files
What is DBAN, sdelete, Secure Empty Trash
making something obscure, unclear, or unintelligible
What is obfuscation?
the purpose of a secure protocol
What is the protection of the integrity and confidentiality of network communications?
five different types of malware
What are trojans, backdoors, ransomware, spam, and keyloggers?
searches for strings of text
What is grep?
captures memory of the system
What is memdump?
hiding information to evade detection
What is steganography?
a popular key exchange protocol
What is Diffie Hellman protocol?
the best way to defend from ransomware attacks
What are backups?
shows the first 10 lines of a file by default
What is head?
searches for hosts on a network
What is NMAP?
a brute-force technique that uses precalculated hashes
What are rainbow tables?
using login credentials from one system to authorize and authenticate to another system
What is a federated network?