What is the line of code that you enter for the IP of the Linux Machine?
hostname -I
Is impersonation allowed on our electronics?
Nope it is disallowed.
Name one form of authentication?
Password.
What year was Kali Linux created?
2013.
Are we allowed to take data from people outside of our course?
Nope.
What year was face id created?
2017.
What was our first lab on Kali linux?
Linux Labs 101.
If you find a vulnerability in a account or website what should you do?
Inform instructor to take action and have them inform account holder.
What does EAP stand for?
A. Environmental Act of Protection
B. Employee Assistance Program
C. Extensible Authentication Protocol
D. Encryption Authentication and Privacy
C. Extensible Authentication Protocol.
What does a keylogger do?
Captures keystrokes of infected device.
Are we allowed to use data published outside of the course on non public sources?
Answer is no it has to be a public source.
What does PAP stand for?
A. Point-against-point
B. Procedure and protection
C. Person against person
D. Password Authentication Protocol
D. Password Authentication Protocol.
In the Juice Shop lab what is the name of the owner email login? (first name)
Jim.
What steps should you make after using the webs tools and methods?
Show a cite and or attribution to the tool.
What does a password vault use for encryption?
A. AES-128
B. SHA-128
C. AES-256
D. SHA-256
C. AES-256