What does CIA stand for?
confidentiality, integrity, and availability
The process of taking plaintext and turning it into incomprehensible text is called ______________
encryption
What does cd stand for?
change directory
16
Convert 00001100 to decimal
12
Encryption helps with this part of CIA Triad (primarily)
confidentiality
This ciphertext, htij, has been encrypted using a caesar cipher with a key of 5. What is the plaintext?
code
In Terminus (linux) I want to find a listing of all of the files (including hidden files), what command would I use?
ls -a
What are the characters used in hex?
0-9, A-F
Convert 11111111 to decimal
255
Knowing that your data will not be changed is what part of the CIA Triad
integrity
Encrypt this plaintext word march using the Atbash cipher.
nzixs
In the cyber kill chain (Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives)
Weaponization means...
to create a cyber weapon like a malware to use on the next step, delivery
What is the decimal value of A from ASCII?
65
What does MFA stand for?
Multifactor Authentication
Using a fingerprint for authentication is an example of something you ___________
are
What type of encryption uses a public and private key?
asymmetric
If I want to see where I am in the terminal - what is the working directory I am in, I would type
pwd
OSINT stands for:
Open Source Intelligence
Which is used for reconnaissance.
What is 16 in binary (write as a byte)?
00010000
Using an ID for authentication is an example of something you ___________
have
A hash is a one-way algorithm that encodes passwords/files, etc to ensure they are not altered. A rainbow table can help attackers figure out the passwords. What is the random text called that can be added to the password to help protect against rainbow tables?
salt
If I am risk averse would I more likely to invest my life savings or no?
NO.
If I am risk tolerant, I would be willing to spend less money on cybersecurity for my business. True or False?
True
Which one of these is not part of the cyber kill chain:
Reconnaissance, Weaponization, Delivery, Multi Factor Authentication, Installation, Command & Control, and Actions on Objectives
Multi Factor Authentication