Windows 1
Linux 1
Windows 2
Potpourri
Tools
Command Access
100

What does tracert do?

Tracert: displays the route of packets and timing between point A and point B.

100

What does the cat command do?

The cat (short for “concatenate“) command is one of the most frequently used commands in Linux/Unix-like operating systems. cat command allows us to create single or multiple files, view content of a file, concatenate files and redirect output in terminal or files.

100

What does ipconfig do?

Ipconfig is used to view the current configuration of IP interfaces at the command line.

100

What is the grep command in Linux used for?

The grep command syntax is simply grep followed by any arguments, then the string we wish to search for and then finally the location in which to search. 

100

What is nmap used for?

Nmap is a port scanner that tells what port are open on your device.  It also allows you to scan your network and discover not only everything connected to it, but also a wide variety of information about what's connected, what services each host is operating, and so on.

100

What are the two types of RBAC?

What is Role Based Access Control, what you do or what group you are part of People have roles.

What is Rule Based Access Control this is part of an ACL and firewalls always think Rules are objects

200

What does nslookup do?

Nsloohup used to search the Domain Name System (DNS) to determine the mapping of domain names to IP addresses.

200

What does the route command do?

The route command allows modification of the IP routing table. It is primarily used to set static routes for traffic to be sent to specific networks or hosts.

200

What does pathping do?

Path ping combines ping and tracert in one command and it helps you to find the location of a packet loss in a route between you and a host

200

What is Wireshark used for?

Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues.

200

The Harvester is used for what?


TheHarvester is an open source python program used to gather OSiNT.  

200

What are the two types of MAC?

What is Mandatory Access Control set by the system

What is Media Access Control (Itme ID)


300

What command is used for ICMP?  What does it do this show you?

What is ping, this shows if a a device is connected and if if is able to be discovered.

300

What does ifconfig do?

ifconfig is used to view the current configuration of IP interfaces at the command line; ifconfig also permits the enabling and disabling of interfaces.

300

What does the arp command do?

Apr allows you to display the IP-address-to-MAC-address mappings that a system has built so that it doesn't have to fetch the same information repeatedly for systems it communicates with.

300

What does the Linux command chmod do?

chmod changes directory permissions in Linux, use the following: chmod +rwx filename to add permissions. chmod -rwx directoryname to remove permissions.

300

Nessus is used for what?

Nessus is a vulnerability scanner.  Nessus can scan a wide variety of operating systems and applications, including all flavors of Windows, macOS, and most Linux distributions. Nessus reports provide information on missing patches and updates, configuration issues, and so on. It can break those down into OS, network segment, vulnerability severity, and many other categories.

300

What is DAC?

What is Discretionary Access Control this is set by the owner of the data

400

What does netstat do?


Netstat displays active TCP connections.  There are various Switches that can be used with the netstat command to display different types of networking related data. For example the switch –a lists all of the TCP/IP connections and listening ports.

400

What does traceroute do?

In Linux traceroute displays the route of packets and timing between point A and point B.

400

What is the curl command used for?

Curl allows you to transfer data from a server using various protocols HTTP, HTTPS, FTP, ect...

400

What is a rainbow table attack?

A rainbow table attack is a password cracking method that uses a special table (a “rainbow table”) to crack the password hashes in a database.  It includes symbols as substitutes ie @ = a

400

What does Cuckoo do?

Cuckoo is a Linux based sandbox environment tool.

400

What is IaaS?

What is  Infrastructure as a service this is hardware only

500

What is SSH used for?

SSH enables a user to log in to a remote machine and execute commands as if they were on the console of that system. SSH is a secure replacement for the older Telnet, which is insecure because its data isn’t encrypted when communicated. SSH provides a secure, encrypted tunnel to access another system remotely.

500

what does dig do?

Dig is used to search the Domain Name System (DNS) to determine the mapping of domain names to IP addresses.

500

Pizza Pizza is the trade mark of which company?

What is Little Cesar's 

500

Who is this this and did his voice originally?

Who is Buzz Lightyear, and Tim Allen

500

What is the dd tool used for?

dd is a command-line utility for Unix and Unix-like operating systems whose primary purpose is to convert and copy files.

500

What is PaaS?

What is  Platform as a service this is where hardware and OS are set for you