What command shows the files in the current directory?
ls
Which application was used for network-based Stego (analyzing packets of information over a network)?
Wireshark
What is the name of the unique identifier for a computer?
Mac address
What kind of loop executes code as long as a condition is met?
While loops
Which cypher is based on a rotation?
Caesar
What game did you play the first day to understand different commands?
Terminus
Each pixel can have a value ranging from what?
(Red, Green, Blue) ---> (0-255, 0-255, 0-255)
what is the name of a unique identifier for a computer on a specific network?
IP address
what is the name of special character used at the end of functions/loops/conditionals?
Colon
How should you break a simple substitution cipher?
Frequency Analysis
What command shows the path (location) of a directory you're in?
pwd
Steganography is Greek for...?
Concealed Writing
What are the five layers of OSI model in modern computer networking?
Physical, Data Link, Network, Transport and Application Layer
What does built-in method input() do?
Prompts use for input
Which cypher is a series of interwoven caesar ciphers?
Vigenere
Which command allowed you to go back one directory?
cd ..
Where does Stepic hide data?
RGB of pixels in an image
Why is the TCP Stream useful?
It makes it easier for you to see specific data and it allows you to see user inputs. Eg. Passwords and Usernames
How do you insert COMMENTS in Python code?
Adding # at beginning of the comment or ''' for multiline comments
What is the name of the "perfect" cypher?
One Time pad
What permissions are given by chmod 777?
Read, Write, Execute for all users
What does EXIF stand for?
Exchangeable image file format
What is the difference between router and switch?
A switch is designed to connect computers within a network, while a router is designed to connect multiple networks together
Python has four primitive variable types, they are?
Integers.Float.Strings.Boolean.
What is the difference between a public and private key?
The public key encrypts while the private key decrypts