S-tool or Steghide
Cryptography is known for its “secret writing”. What technique is used to hide information?
Encryption
Should you use the same password between multiple accounts?
No
What is the concept where information, an information system or a component of a system has not been modified in an unauthorized manner.
How do you create new users in Kali/Linux systems?
useradd
What is -ef stand for?
Embed file
What is the term used for information that is sent with encryption?
Ciphertext
You receive a random email from your bank asking for you to use the link to "get your money now!"
Phishing
What is the comprehensive strategy of including multiple layers of security within a system so that if one layer fails, another layer of security is in place to stop an attack or unauthorized acces
Defense in Depth
chmod
What does -cf stand for?
Cover file
What machine was used by the Germans in World War II to encrypt and decrypt messages?
The Enigma machine
In order to make your computer/devices more secure, these periodically get released
System updates
What is the property that information, an information system or a component of a system has not been modified in an unauthorized manner.
Keep it Simple
what are the octal values for read, write, and execute?
4, 2, 1
What does steghide --help do?
The steghide help menu / the options
To encrypt plaintext to ciphertext, what is needed besides an encryption algorithm?
Key
When you log in, you have to accept a confirmation token on your phone in addition to using your password
Multi-factor authentication (something you own, something you know)
Example: For a GenCyber camper to work on virtual machines in ODU MOVE, you first need GenCyber instructors to open an account for you, then you need to log in as a regular user to use the VMs and applications and tools on VMs. You need to have administrator privilege to manage user accounts.Which concept is this?
Defense in Depth
What is the_____ file that is used by JtR to crack password?
dictionary file or rockyou.txt
How do you extract from s-tool?
Right click, then click reveal, click passphrase, and then click save as
I collect, preserve, analyze, and present technical evidence for law enforcement, what am I?
Computer forensics
What should you use before you connect to public wifi?
VPN (Virtual Private Network)
Which 3 GenCyber concepts ALSO encompass the CIA triad?
Explain the octal file permission set of "750"
user has read write and execute, group has execute and write, and everyone else has no permissions