What isn't a form of social engineering?
lishing, vishing, phishing, smishing
lishing
Convert the number 20 to binary
00010100
One commonly used asymmetric encryption method is known as: RSS, SSA,RSA, RAA
RSA
What command will make a new directory called NewDirectory?
mkdir NewDirectory
A MAC address is a _______ address
physical or permanent
The CIA Triad stands for?
Confidentiality, Integrity, Availability
Alice is checking her grades and forgets to log out before she leaves. Bob gets on the computer, and he sees her grades. What part of the CIA Triad does this affect?
Confidentiality
A byte is how many bits?
8
What does the cat command do?
a. Opens a file for editing
b. Outputs the string that is being passed to it
c. Finds a pattern in a string
d. Outputs contents of a file to the command prompt screen
d
What layer of the OSI does a router reside?
Network
What is the weakest link in the security chain?
people
What is -2 mod 6?
4
What is 32 mod 3?
2
Which of the following commands will show you the current directory you are in?
pwd
Which protocol checks to see if all packets have been received?
TCP
Which of these types of malware makes copies of itself?
a spyware
b worm
c adware
d phishing
b
What is the hex value E in decimal?
14
In an asymmetric encryption method, the sender uses the _________ key to encrypt the message.
public
Linux commands are not case sensitive
True or False?
False
If the post office were to send mail like routers which would be true?
a. One mail carrier takes the letter from sender to receiver.
b. Mail between different countries would take weeks to deliver
c. The mail carrier would sometimes take different paths.
d. Your mail could not be delivered if a road was blocked.
c
Who was the lead of the group that cracked Enigma?
a Winston Churchill
b Mark Briggman
c Adolf Hitler
d Alan Turing
d
What is the hex value AB in decimal?
171
This animal was encrypted using Caesar Cipher with a key of 2. What is the animal?
ciphertext = FQI
dog
This command will show all files (including hidden) in a directory
ls -a
Data on a TCP/IP network travel in?
a. buckets
b. pockets
c. packets
d. boxes
c