Information Hiding
Cyber Hygiene
CIA Triad
More Linux Stuff
100

Name a tool that is used for steganography

S-tool or Steghide

100

Which of the following passwords is more secure?

Phish4Fish or G3nCyb&r20

G3nCyb&r20

100

These 3 concepts are essential in cybersecurity as it provides vital security features, helps in avoiding compliance issues, ensures business continuity, and prevents reputational damage to the organization.

Confidentiality, Integrity, and Availability

100

This command shows you what is in your current directory (in Linux)

ls (List command)

200

This cipher involves using the Caesar Cipher multiple times

Vigenère cipher

200

What can you use to store your passwords?

Password manager

200

Your work's web server has gone done and now you cannot access the database you need to do your job

(What is this a violation of?)

Availability

200

This command displays the contents of a file

cat (Concatenate command)

300

This machine was used by the Germans in World War II to encrypt and decrypt messages?

The Enigma machine

300

What should you use before connecting to a public wifi connection?

VPN (Virtual Private Network)

300

An employee is required to prove that they have the proper security clearance before access is granted

Confidentiality

300

This directory in kali linux is where rockyou.txt is located.

/usr/share/wordlists

400

This is needed to encrypt plaintext to cipher text besides the encryption algorithm itself?

Key

400

This type of tool checks the "something that you are" to allow you access.

Biometrics

400

You are typing your login information while someone else is watching you type your password in

Confidentiality

400

This is the payload that is delivered from Attacker Kali to  Windows 7 

calc.exe

500

Which steps must be completed to extract data using S-tool?

Right click the image, then click reveal, then click passphrase, and then click save as

500

This type of geographical information is added to various forms of media in the form of metadata. One can control location settings in their devices so that others can or cannot track their whereabouts. What is this geographical metadata called?

Geotagging (Geolocation)

500

You are sending an email to one of your friends, a hacker intercepts the email and changes the message and then sends it to your friend

Integrity

500

Explain what this command does:

tshark -i # (Ethernet number) -c # (Number of packets) -w filename.pcap

It will scan on a specific ethernet number for a specific number of packets and then write all the captured data to the named file