This is the term for a machine/computer that does not exist physically.
What is a virtual machine?
Wireshark is used to carry out this process.
What is traffic analysis?
True/False: The four-way handshake indicates a vulnerabilty in Wi-Fi traffic.
What is true?
This application contains a database of exploits, is free to download, and makes hacking easy.
What is Metasploit?
You caught your coworker at your boss' desk, looking at documents they were not authorized to see.
What aspect of the CIA Triad has been violated here?
What is confidentiality?
Alice and Bob use one secret key to encrypt the messages they send to each other. They are demonstrating this kind of encryption/cryptography
What is private key?
True/False: Passwords are harder to crack when they are shorter and are only lowercase characters.
What is false?
John is a penetration tester who has been hired by a company. After completing his test, he gives his report to the company detailing their vulnerabilities which they then use to secure their systems further. John is an example of what kind of hacker?
What is a white hat hacker?
We hid adventureland.txt inside octopus.bmp. Hiding files within other files is the definition of this.
What is steganography?
When data is sent across a network, it is broken into pieces called this.
What are packets?
What is Aircrack-ng?
This is the malware that the threat actor intends to deliver to the victim.
What is a payload?