Linux CLI
Cryptography
Certificates
Network
OS
100

The program we use to create and edit files through the CLI

What is VI/Vim?

100

This type of encryption uses one key between two users to encrypt and decrypt

What is symmetric encryption?

100

This idea states that even if the algorithm is known, the key should stay secure.

What is Kerchoff's Principle?

100

This software is used to scan a list of open ports on a network.

What is nmap?

100

The principle which instructs systems to only allow users to perform what is most necessary to operation.

What is the principle of least privilege?

200
This command line character allows me to append the results of one command to an input of another.

What is the pipe? (|).

200

This one-way encryption process is used for creating signatures or 'storing' passwords.

What is hashing?

200
This trusted entity forms the basis of digital security by verifying the security of both entities and websites to establish secure communication. 

What is a Root Certificate Authority?

200

This response is sent by the server when a client tries to initiate a TCP connection.

What is SYN ACK?

200

This prevents attacks that look for data in specific memory locations.

What is Address Space Layout Randomization?

300

This command lets users delete files SECURELY

What is shred/srm?

300

This scheme is used to encode plaintext before encryption

What is base64?

300

The process we talked about in class to perform asymmetric encryption during a TLS handshake.

What is Diffie-Hellman?

300

This type of attack prevents users from accessing some network service by spoofing internet users and flooding a service with requests.


(I need the full name, not just the acronym!)

What is a Distributed Denial of Service attack?

300

This prevents non-text regions of processes from being executed.

What is Data Execution Prevention?

400

This command and number sequence would make a given file readable to all, writeable to only user, and executable to group.

What is chmod 654?

400

This encryption process adds a string of random characters to a hashed password before encryption, and is stored separately from the password file.

What is a pepper?

400

This is a list of invalid certificates which should not be trusted and is managed by Certificate Authorities.

What is the Certificate Revocation List?

400
This port is considered the 'secure port'.

What is port 443?

400

These two actions are crucial in highlighting security issues across OS processes.

What is Logging and Auditing?

500

This command will show the end contents of a file.

What is 'tail'?

500
This encryption algorithm describes a family of algorithms used for asymmetric encryption, as an alternative to RSA encryption (with smaller key sizes).

What is Elliptic Curve Cryptography?

500

These three pieces of information are passed during a TLS handshake from a client upon starting communication.

What are the supported ciphersuites, the TLS version used by the client, and the 'client random'?

500

This process of defense analyzes what content is being sent through ports.

What is Deep Packet Inspection?
500

This file saves the user's passwords

What is /etc/shadow?