More general
General
General PII
Command Line
Networking
100

What isn't a form of social engineering? 

lishing, vishing, phishing, smishing

lishing

100

Convert the number 20 to binary

00010100

100

One commonly used asymmetric encryption method is known as: RSS, SSA,RSA, RAA

RSA

100

What command will make a new directory called NewDirectory?

mkdir NewDirectory

100

A MAC address is a _______ address

physical or permanent

200

The CIA Triad stands for?


Confidentiality, Integrity, Availability

200

Alice is checking her grades and forgets to log out before she leaves. Bob gets on the computer, and he sees her grades. What part of the CIA Triad does this affect?

Confidentiality

200

A byte is how many bits?

8

200

What does the cat command do?

a. Opens a file for editing

b. Outputs the string that is being passed to it

c. Finds a pattern in a string

 d. Outputs contents of a file to the command prompt screen

d

200

What layer of the OSI does a router reside?

Network

300

What is the weakest link in the security chain?

people

300

What is -2 mod 6?

4

300

What is 32 mod 3?

2

300

Which of the following commands will show you the current directory you are in?

pwd

300

Which protocol checks to see if all packets have been received?

TCP

400

Which of these types of malware makes copies of itself?

 a spyware

 b worm

 c adware

 d phishing

b

400

What is the hex value E in decimal?

14

400

In an asymmetric encryption method, the sender uses the _________ key to encrypt the message.

public

400

Linux commands are not case sensitive 

True or False?

False

400

If the post office were to send mail like routers which would be true?

a. One mail carrier takes the letter from sender to receiver.

b. Mail between different countries would take weeks to deliver

c. The mail carrier would sometimes take different paths.

d. Your mail could not be delivered if a road was blocked.

c

500

Who was the lead of the group that cracked Enigma?

 a Winston Churchill

 b Mark Briggman

 c Adolf Hitler

 d Alan Turing

d

500

What is the hex value AB in decimal?

171

500

This animal was encrypted using Caesar Cipher with a key of 2.  What is the animal?

ciphertext = FQI

dog

500

This command will show all files (including hidden) in a directory

ls -a

500

Data on a TCP/IP network travel in?

a. buckets

b. pockets

c. packets

d. boxes

c