Intro Flashcards
Which of the following is a common security issue in Linux systems?
Weak passwords, excessive superuser privileges, and vulnerabilities like unintended flaws that can be exploited
Which control enables the creation of rules that allow or block traffic?
iptables
Define OWASP?
Open Web Application Security Project
What does cd mean in Linux?
Change Directory
What does mkdir mean in Linux?
Make Directory
Which type of network is the internet considered to be?
WAN (Wide Area Network)
Which type of attack involves sniffing data between two or more computers?
On-Path
Kali Linux is used for penetration testing? T/F
True
Reviewing systems for possible weaknesses is called?
Vulnerability assessment
What items are involved in risk calculations?
Threat, Asset, Vulnerability
What is a type of antivirus?
ClamAV
Which part of the CIA triad ensures that data hasn’t changed in transit?
Integrity
The primary use for the NMAP tool is to scan network computers? T/F
True
What type of team would a SOC analyst belong to?
Blue team
Which government agency is part of DHS? (Department of Homeland Security)
CISA
What tool can be used for password cracking?
Hydra