Cyber 1
Cyber 2
Malware
Linux
Linux Commands
100

What are the 3 items that represent the CIA triad?

1. Integrity

2. Confidentiality

3. Availability

100

A __________ is the device that is requesting information or services from a server on a network.

client

100

Name that Malware:

"Annoying software that advertises products and services all over the system"

Adware

100

What is the difference between a file and a directory?

Directories can contain other files and directories, files cannot

100

What does the command ls -l do?

Lists the contents of the directory

200

The scanning phase of ethical hacking is important because it _______

Determines what software is running on the system that may be vulnerable

200

A ___________ is a network device that controls and filters data between networks, either wired or wireless.

router

200

Name that malware:

"Holds a victim’s data hostage until a payment is received"

Ransomware

200

rm file does which of the following?

remove file

200

When I use mv, I am ______

Moving or renaming files

300

__________ refers to the action of watching and analyzing network traffic at the packet level.

packet sniffer

300

Which CIA category represents this scenario:  Involves the efforts of an organization to make sure data is kept secret or private.

confidentiality

300

Name that malware:

"Software that listens to user activity on a system"

Spyware

300

When I use mv, I am ______

Moving or renaming files

300

What does cd stands for ?

Change directory

400

A Wireshark data capture file that contains packet information of network traffic is called __________.

pcap file

400

A Denial of Service (DoS) or Distributed Denial of Service (DDoS) attack compromises which item in the CIA triad?

Availability

400

Name that malware:

"A piece of code that attaches itself to a system process, file, etc…"

Virus

400

What command would you use to forcefully shut down a process?

kill

400

What does cat file do?

prints all contents of file

500

The attacker spoofs the IP address DNS entries for a target website on a given DNS server and replaces them with the IP address under their control. This compromises which item in the CIA triad?

Integrity

500

________ is a part of a process or system that is seen by the user and typically provides functionality to the user.

Front-end

500

Name that malware:

"A virus that can self-replicate on a system or network"

Worm

500

cd stands for _____

Change directory

500

What is the command for administrator that allows root access?

Sudo