This piece of information about you computer is used for a variety of system administration, including building a network map, running port scans, and managing an external firewall.
IP Address
This is the full path of the file contains a list of local users on a Linux machine.
/etc/passwd
Name three pieces of information about a network that would be bad to keep scribbled on a sticky note next to your computer.
Users, passwords, ip addresses, specific computer functions, etc
This phrase refers to a visual map of all systems on a network, usually with descriptors about each system like IP addresses, operating systems, and primary services.
Network topology
This Pokemon game, originally released for the Gameboy Color, was not remastered for the Nintendo DS along with its generational counterparts.
Pokemon crystal
The flags that should be used with the netstat command on Linux
- tulpn, /t,u,l,p,n
This command can (and should) be used to change the permissions of a file on a Linux machine.
chmod
These files are used to manage parameters and startup settings for applications, server processes, and operating systems.
Configuration files
Name two flags that you would usually use with the nmap command.
-sV, -PN
Four different starter pokemon gain fighting as their secondary type, making it the most common secondary type among starters. Name one of the two secondary types that are tied for the second most common.
Ground or Dark
This is the default firewall software for most Linux distributions.
iptables
These two groups contain privileged users.
Wheel and sudo
This Linux utility is used to schedule scripts on your machine at a specified time interval.
Cron, cron jobs
The security triad informs how we develop secure protocols for data management. Name the there parts of the security triad.
Confidentiality, integrity, and availability/accessibility
There are no mono-typed non-legendary pokemon that are this type.
Flying
Name an action that you can take to improve your network security by modifying your computer’s firewall rules or managing processes.
Close ports, kill services, block malicious ips
This database system has its own list of users that need to be secured.
SQL server database
On a Linux machine hosting a web server, this directory would be the most likely place to find a hidden php shell. (Full filepath)
/var/www/html
Encryption and obfuscation are two common ways that people try to secure data. Encryption involves using algorithms or mathematics to transform data in order to keep it confidential. Define obfuscation.
Hiding data to make it hard to find.
The trainer Red has all four starters from the original game on his team, as well as two other pokemon- one of which is replaced by a third between Gold and Silver and their remakes. Name all three of these pokemon.
Snorlax, Espeon, and Lapras
Name three default ports that you might need to keep open using firewall rules, and/or the services that run on them.
22 (tcp/udp), 25 (smtp), 53 (dns), 80 (http), 8080 (http alternate), 443 (https)
This command can be used to add, delete, disable, and change the password of users on Windows when passed the appropriate parameters.
net user
Using this protocol can allow an attacker to take control of your desktop, and should very rarely be allowed on your system at all.
RDP
This single linux command, including the appropriate flags and parameters, will delete every file on your computer.
rm -rf /
Give the default player names for a Pokemon game that had both a male and female player option.
Red and Leaf; Ethan and Kris; Brendan and May; Lucas and Dawn; Hilbert and Hilda; Nate and Rosa; Calem and Serena; Elio and Selene; Chase and Elaine