Linux Commands I
Linux Commands II
Linux File System
Win File System
Win. Configuration Tools
Cisco Device Commands
Cisco Show Commands
Net+/Sec+
CyberPatriot Potluck
100

Display file contents on the terminal.

cat

100

Establish a secure encrypted connection between two hosts over an insecure network

ssh

100

Linux files are stored in _______.

directories

100

Files and directories are organized in a tree-like structure with a root directory at the top, allowing for nested subdirectories

Hierarchical structure

100

_____ is the main application to customize and manage Windows settings.

Settings

100

enter global configuration mode

configure terminal

100

display interface designations, IP address and status

show ip interface brief

100

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:

SSH

100

What is the first thing you must do once you sign into your image?

Open and read the readme file.

200

Print text or variables in the terminal.

echo

200

Removes a running process from memory.

kill

200

Linux filesystem tree: Base or trunk of the tree is the _____.

root directory

200

Represented by a backslash (\), this is the starting point for navigating the file system.

Root directory

200

_____ is an application that serves as a system monitor and startup manager for Windows, providing insights into your device's performance and resource consumption.

Task Manager

200

configure the NAME of the Router or Switch

hostname NAME

200

display routing table

show ip route

200

This refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

DNS

200

What is the first thing you do to and operating system unless told otherwise.

Update the operating system.

300

Get the full path to a command's executable file.

which

300

Display active processes.

ps

300

Branches of the Linux filesystem tree are _____.

directories

300

A complete path to a file specifies each directory in the hierarchy, separated by backslashes, starting from the root directory.

Directory paths

300

The _____ _____ console is a Microsoft Management Console (MMC) snap-in that provides a centralized location for managing various system components, services, and settings on Windows.

Computer Management

300

set minimum password length

security passwords min-length

300

on switch - show what VLANs exist, names, ports assigned

show vlan brief

300

This provides an alternative solution to the manual allocation of IP addresses?

DHCP

300

What is Microsoft's minimum password length guideline?

8 characters

400

Change to another directory.

cd

400

Superuser Do

sudo

400

–Leaves of the Linux filesystem tree are _____.

files

400

Windows has rules regarding file names, including character limitations and restrictions on certain characters.

File naming conventions

400

The _____ _____ is a Microsoft Management Console (MMC) snap-in that you can use to view and manage event logs.

Event Viewer

400

encrypt all passwords – except secret

service password-encryption

400

display the running configuration - active  

show running-config

400

This refers to a network protocol used for synchronizing clocks over a computer network? 

NTP

400

What is the most important rule about creating passwords for Windows or Linux.

Ban common passwords.

500

Locate a file or directory by name.

find

500

Package Manager

apt-get

500

Linux commands, files, and directory names are _____ _____.

case sensitive

500

The primary file system on modern Windows, offering features like security permissions, data compression, and journaling for reliability.

NTFS (New Technology File System)

500

The _____ _____ is a feature that's been part of Windows for a long time. It provides a centralized location to view and manipulate system settings and controls.

Control Panel

500

suppress DNS attempt when a command is mistyped

no ip domain-lookup

500

what routing protocol, which networks, passive interfaces, neighbors

show ip protocol

500

This is the name of a network protocol that secures web traffic via SSL/TLS encryption? 

HTTPS

500

What are the three types of characters required for password creation?

Uppercase

Lowercase

Non-alphanumeric

600

Search for a string within an output.

grep

600

Display the user ID.

whoami

600

_____ are sequenced lists of commands that allow users to send multiple commands at once.

Scripts

600

The ______ _____ is a critical component of the Windows operating system. It contains essential system files and libraries necessary for the proper functioning of the operating system.

System Directory

600

This provides options to customize the startup process, including the ability to enable or disable software, control startup services, and access other advanced system settings.

System Configuration

600

create a MESSAGE that will display when logging in

banner motd

600

which IOS, capability, memory, configuration-register

show version

600

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:

Phishing

600

What is the standard maximum password age for users for a Windows password?

90 days

700

List the contents of a directory.

ls

700

Create Empty File

touch

700

_____ is the tool used to access the Ubuntu Command Line.

Terminal

700

A _____ _____ is the unique address that specifies the location of a file or directory within the Windows directory structure.

file path

700

This is a system utility that provides a comprehensive view of the hardware, system components, and software environment on a Windows device.

System Information

700

leave interface config and return to global config

Exit

700

show routing table entries learned through OSPF

show ip route ospf

700

The practice of using a telephone system to manipulate user into disclosing confidential information is known as:

Vishing

700

What is the minimum password age for a Windows password?

10-30 days

800

Get the name of the present working directory.

pwd

800

Change Mode

chmod

800

The Linux Administrator account

Root

800

The _____ _____ is a built-in Windows tool that provides a graphical interface to navigate through the directory structure.

File Explorer

800

The _____ _____ is a powerful tool used to view and modify the system registry.

Registry Editor

800

turn the interface on

no shutdown

800

shows active processes running on router

show processes

800

Which of the following answers refers to a social engineering attack that exploits SMS or text messages to deceive recipients into taking harmful actions, such as revealing sensitive information or clicking malicious links?

Smishing

800
Is the password complexity requirement enabled or disabled during hardening?

Enabled

900

Access manual pages for all Linux commands.

man

900

Change Owner

chown 

900

system configuration files.

/etc

900

The _____ _____ is a command-line interface that allows users to interact with the system through text commands.

Command Prompt (CMD)

900

The _____ _____ _____ _____ is a Microsoft Management Console (MMC) snap-in that provides a single user interface through which all the settings of local group policy object can be managed.

Local Group Policy Editor

900

make the user level password ‘PASSWORD’

password PASSWORD

900

shows cpu statistics

show process cpu

900

 Which type of social engineering attack relies on identity fraud?

Impersonation

900
Is reversable encryption enabled or disabled during hardeneing?

Disabled

1000

Get information about network connections and more.

netstat

1000

Display Date and Time

date

1000

log files.

/var

1000

An _____ _____ _____ provides the complete path from the root directory to the target file or directory.

absolute file path

1000

_____ _____ _____ is a system utility that you can use to access and modify settings that are not typically available in Settings or Control Panel.

Advanced System Settings

1000

a mode in which a user has elevated access to a device and can perform a wide range of actions

Privileged exec mode

1000

shows memory allocation

show memory

1000

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is called:

Ransomware

1000

What is the Account Lockout Duration during Windows hardening?

30 minutes