Day 1 Questions
Day 2 Questions
Day 3 Questions
Day 4 Questions
Day 5 Questions
100

What is the first site we need to access in order to access the ODU virtual environment?

100

What two tools can we use to analyze our traffic?

Wireshark and T-shark

100

Which type of user has access to all commands on a linux system?

root user


100

Who are the people called that work for companies and try to hack them as an outsider?

Ethical hacker, White hat hacker

100

This is used to prevent unauthorized programs or internet users from accessing a private network or computer

Firewall

200

What are the commands to get the IP from a Windows computer and a Linux computer?

ipconfig and ifconfig

200

Data is sent across the network in______?

Packets

200

Which attack tries every possible combination until it gets the right one?

Brute Force Attack

200

Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99.


Which part of the CIA triad has been broken?

Integrity

200

What is the name of the open-source firewall computer software that could be configured through a web-based interface that we used in the camp?

pfSense

300

What does the CIA triad stand for?

Confidentiality, Integrity, and Availability

300

These are the endpoints on where a packet wants to go. They are labeled by numbers from 0-65536.

Ports

300

[29, 84, 15, 48, 13, 22, 94]


Which number has the index value of 4?

13

300

What test is used to evaluate the security of a system?

Penetration Test

300

What is the command-line firewall utility that uses policy chains to filter the traffic of data packets that we used in the camp? (Hint: it is a Linux kernel firewall)

iptables

400

What Raspberry Pi model does Zumi run on?

Raspberry Pi Zero

400

This ciphertext was encrypted with a Caesar cipher with a phase shift of 2: 

igpeadgt

Decode the message.

gencyber

400

How many total characters are there that could be used to form a password? (hint: this includes lowercase letters, uppercase letters, numbers, and special symbols)

  1. 54

  2. 62

  3. 70

  4. 78

D

400

What program is used to discover vulnerabilities in a network?

Nmap

400

This network interface includes external network connections i.e router or Internet (www.) (public domain)

Wide Area Network (WAN)

500

What are the two steganography tools we used in this camp?

Steghide and S-tools

500

What do these lines of code do?

num = random.randrange(0, 10)

print(num)

create a random integer from 0 to 9, inclusive, and print it to the console (note: doesnt have to be exact words)

500

___ is a complete suite of tools to assess Wi-Fi network security. It is used for monitoring, attacking, testing, and cracking.

Aircrack-ng

500

What is the malware that the threat actor intends to deliver to the victim called? (hint: it is an exploit module and is the code that causes the actual damage).

Payload

500

What command is used to give specific users permission to use specific system commands at the root level of the system?

Sudo