CIA Triad/Authentication
Encryption
Command Line
Hex/ASCII
Binary
100

What does CIA stand for?

confidentiality, integrity, and availability

100

The process of taking plaintext and turning it into incomprehensible text is called ______________

encryption

100

What does cd stand for?

change directory

100
How many characters are used in hexadecimal?

16

100

Convert 00001100 to decimal

12

200

Encryption helps with this part of CIA Triad (primarily)

confidentiality

200

This ciphertext, htij, has been encrypted using a caesar cipher with a key of 5.  What is the plaintext?

code

200

In Terminus (linux) I want to find a listing of all of the files (including hidden files), what command would I use?

ls -a

200

What are the characters used in hex?

0-9, A-F

200

Convert 11111111 to decimal

255

300

Knowing that your data will not be changed is what part of the CIA Triad

integrity

300

Encrypt this plaintext word march using the Atbash cipher.

nzixs

300

In the cyber kill chain (Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives)


Weaponization means...

to create a cyber weapon like a malware to use on the next step, delivery

300

What is the decimal value of A from ASCII?

65

300

What does MFA stand for?

Multifactor Authentication

400

Using a fingerprint for authentication is an example of something you ___________

are

400

What type of encryption uses a public and private key?

asymmetric

400

If I want to see where I am in the terminal - what is the working directory I am in, I would type

pwd

400

OSINT stands for:

Open Source Intelligence

Which is used for reconnaissance. 

400

What is 16 in binary (write as a byte)?

00010000

500

Using an ID for authentication is an example of something you ___________

have

500

A hash is a one-way algorithm that encodes passwords/files, etc to ensure they are not altered.  A rainbow table can help attackers figure out the passwords.  What is the random text called that can be added to the password to help protect against rainbow tables?

salt

500

If I am risk averse would I more likely to invest my life savings or no?

NO. 

500

If I am risk tolerant, I would be willing to spend less money on cybersecurity for my business. True or False?

True

500

Which one of these is not part of the cyber kill chain:

Reconnaissance, Weaponization, Delivery, Multi Factor Authentication, Installation, Command & Control, and Actions on Objectives

Multi Factor Authentication