Kali
White Hat Hacker Oath
Authentication
100

What is the line of code that you enter for the IP of the Linux Machine?

hostname -I

100

Is impersonation allowed on our electronics?

Nope it is disallowed.

100

Name one form of authentication?

Password.

200

What year was Kali Linux created?

2013.

200

Are we allowed to take data from people outside of our course?

Nope.

200

What year was face id created?

2017.

300

What was our first lab on Kali linux?

Linux Labs 101.

300

If you find a vulnerability in a account or website what should you do?

Inform instructor to take action and have them inform account holder.

300

What does EAP stand for?
    A. Environmental Act of Protection
    B. Employee Assistance Program
    C. Extensible Authentication Protocol
    D. Encryption Authentication and Privacy

C. Extensible Authentication Protocol.

400

What does a keylogger do?

Captures keystrokes of infected device.

400

Are we allowed to use data published outside of the course on non public sources?

Answer is no it has to be a public source.

400

What does PAP stand for?
    A. Point-against-point
    B. Procedure and protection
    C. Person against person
    D. Password Authentication Protocol

D. Password Authentication Protocol.

500

In the Juice Shop lab what is the name of the owner email login? (first name)

Jim.

500

What steps should you make after using the webs tools and methods?

Show a cite and or attribution to the tool.

500

What does a password vault use for encryption?

A. AES-128
B. SHA-128
C. AES-256
D. SHA-256

C. AES-256