Which command line tool did you use earlier this week to conduct traffic analysis?
How long do images, posts, or any other content that you upload onto the internet last?
Forever
The gaining of remote access to a shell or terminal as the administrator on that host is called?
Infiltration
This very sophisticated hack was deployed in 2010. It was able to determine its exact location and environment, to then destroyed a sizeable number of Iran's nuclear centrifuges.
Stuxnet
What does TCP stand for?
Transmission Control Protocol
This popular and powerful program can be used to probe systematic vulnerabilities on networks and servers. It also includes a large and extensible database of automated exploits that can be used once the first step of the kill chain has been concluded.
Metasploit Framework
This philosophic study pertains to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.
Cyberethics
Recovering deleted files, webpages, chat logs, and emails are all examples of
Computer Forensic Capabilities
What is the most notorious Ransomware exploit?
CryptoLocker
2FA stands for this
2 Factor Authentication
This filter:
"tcp.port eq 25 or icmp"
will do what?
Show only SMTP (port 25) and ICMP traffic
The threatening, lying, spreading rumors, gossiping, creating hate groups or fake profiles are different types of examples of?
Cyberbullying
This delivery system is used for the payload
Exploit
Which type of Cyberattack did Netflix Launch Against Itself to Help Save the Internet
DDoS or Distributed Denial of Service
The network security technology originally built for detecting vulnerability exploits against a target application or computer extended by adding the ability to block threats in addition to detecting them is this
IDS/IPS (Intrusion Detection Systems/Intrusion Protection Systems)
This popular and powerful program can be used to probe systematic vulnerabilities on networks and servers. It also includes a large and extensible database of automated exploits that can be used once the first step of the kill chain has been concluded.
Metasploit Framework
This philosophic study pertains to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.
Cyberethics
Recovering deleted files, webpages, chat logs, and emails are all examples of
Computer Forensic Capabilities
This malware program includes a back door for administrative control over the target computer by distributing Remote Access Trojans is what?
RAT (Remote Access Trojan)
This acronym was introduced on day for of the camp:
msf
What does it stand for?
Metasploit Framework
These 3 password cracking tools were introduced on day 3.
JtR, Cain and Abel, and AirCrack-NG
The set of social conventions that facilitate interaction over networks, ranging from mailing lists to blogs and forums.
Netiquette
This command-line firewall utility uses policy chains to allow or block traffic. When a connection tries to establish itself on your system, the utility looks for a rule in its list to match it to. If it doesn’t find one, it resorts to the default action.
iptables
This worm infects Windows computers by encrypting files on the PC's hard drive, making them impossible for users to access, then demands a ransom payment in bitcoin in order to decrypt them
WannaCry
The acronym AES stands for this?
Advanced Encryption Standard