Steganography
Cryptography
Cyber hygiene
GenCyber Concepts
Kali Linux
100
Name a tool used for steganography

S-tool or Steghide

100

Cryptography is known for its “secret writing”. What technique is used to hide information?

Encryption

100

Should you use the same password between multiple accounts?

No

100

What is the concept where information has not been modified in an unauthorized manner.

Integrity

100

How do you create new users in Kali Linux systems?

useradd

200

What does -ef stand for?

Embed file

200

What is the term used for information that is sent with encryption?

Ciphertext

200

You receive a random email from your bank asking for you to use the link to "get your money now!"

Phishing

200

What is the comprehensive strategy of including multiple layers of security within a system so that if one layer fails, another layer of security is in place to stop an attack or unauthorized acces

Defense in Depth

200

What command do you use to change the permissions of a file?

chmod

300

What does -cf stand for?

Cover file

300

What machine was used by the Germans in World War II to encrypt and decrypt messages?

The Enigma machine

300

In order to make your computer/devices more secure, these periodically get released

System updates

300

This concept puts you in the attacker's shoes

Think like an adversary

300

what are the octal values for read, write, and execute?

4, 2, 1

400

What does steghide --help show?

The steghide help menu / the options

400

To encrypt plaintext to ciphertext, what is needed besides an encryption algorithm?

Key

400

What should you use before you connect to public wi-fi?

VPN (Virtual Private Network)

400

All systems perform best when they are kept ______ over complex

Keep it simple

400

We use this software suite to crack wifi passwords

Aircrack-ng

500

How do you extract a hidden file from s-tool?

Right click, then click reveal, click passphrase, and then click save as

500

I collect, preserve, analyze, and present technical evidence for law enforcement, what am I?

Computer forensics

500

When you log in, you have to accept a confirmation token on your phone in addition to using your password

Multi-factor authentication (something you own, something you know)

500
Oh no! A local tornado came in and yeeted the wifi tower! What gencyber concept just got broken?

Availability

500

Explain the octal file permission set of "750"

Owner: Read, write and execute, 

Group: Read and execute

Everyone else: No permissions