Test 1 Flashcards
Batch file scripting ends in what three letters
In Batch file scripting how do you comment?
rem
In Batch file scripting how do you output to the console?
echo
In Batch file scripting how do you run a file or program?
start
What does the pause command do in Batch file scripting?
it paueses the program and gives you a prompt that says, “Press any key to continue”
How do you declare a variable in Batch file scripting?
set
What does “if not” mean in Batch file scripting?
checking a false condition
What does “if exist” mean in Batch file scripting?
checking if a file or folder exists
What does “if defined” mean in Batch file scripting?
checking if a variable exist
What is the extension of power shell script files?
.ps1
Power Shell- How to check the script execution policy set on your computer?
Get-ExecutionPolicy
Power Shell- What does “-whatif” do?
will tell you what the command will do without actually running the command
Power Shell- How to do a line comment?
#
Power Shell- How to do a block comment?
<# >
Power Shell- How to declare a variable?
$
Bash Scripting - How to open a new bash shell to execute the script?
!/bin/bash
Bash Scripting - How to change the file permissions for the user, group, and other categories so the shell script can be executed?
Chmod ugo+x filename or chmod 755 filename
What does “chmod” do?
Chmod (change mode) modifies the file permissions of the given file
Bash Scripting - how to declare a variable?
Variables are not declared, you just pick a variable name and assign it a value
Bash Scripting - How to access the value of a variable?
$
Bash Scripting - How to input a value?
read
Bash Scripting - How to do Arithmetic (Math)?
let
Bash Scripting - What is the basic if structure?
if [condition]
then
statements
fi
What is a Hacker?
a general term used to refer to a person who uses advanced computer skills to attack computers
What is a cybercriminal?
Are a loose network of attackers, identity thieves, and financial fraudsters
What is Script Kiddies?
Attackers who use prewritten software and scripts to attack since that usually lack the knowledge of computers and networks
What are Brokers?
Those who sell vulnerability information to anyone who is willing to pay for it
What are CyberTerrorists?
Those who want to disrupt and cause panic to others motivated usually by ideological reasons
What are Hacktivists?
Typically a loosely organized group that attacks as a form of protesting or retaliation
State-Sponsored attackers
government sponsored attacks against another government or persons
What are the steps of an Attack?
Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, Actions on Objectives
What are the steps in defending against an attack?
Layering, Limiting, Diversity, Obscurity, Simplicity
What is Cryptography?
scrambling information so that only authorized individuals can use it
What is Encryption?
the process of changing the original data into scrambled data
What is Decryption?
the process of changing the scrambled data back to it’s original data
What is Plaintext?
unencrypted data that is the input for encryption or the output of decryption
What is Ciphertext?
The scrambled and unusable output of encryption
What is Cleartext?
usable (unencrypted) data that is transmitted or stored and is not intended to be encrypted
What is a cipher or algorithm?
procedures based on a mathematical formula to encrypt and decrypt the data
What is a key?
a Mathematical value entered into a cipher to produce the ciphertext
What is Cryptoanalysis?
sophisticated statistical analysis on ciphertext to try to discover the underlying key to the cryptographic algorithm
What is Steganography?
Hiding the existence of data
an older (and somewhat obsolete) protocol used mostly for web servers and browers
Secure Sockets Layer (SSL)
a newer and more secure protocol derived from SSL, mostly used for web servers and browers
Transport Layer Security (TLS)
protocol used to access remote computers (typically Unix/Linux based)
Secure Shell (SSH)
HTTP protocol that uses SSL or TLS encryption
Hypertext Transport Protocol Secure (HTTPS)
protocol used for encrypted mail
Secure/Multipurpose Internet Mail Extensions (S/MIME)
protocol to encrypt audio and video communications over the internet
Secure Real-time Transport Protocol (SRTP)
A protocol suite for securing ip communications
IP security (IPsec)
What is a man in the middle attack?
involves a threat actor who inserts themselves between two entities, intercepting the data they are sending each other
What is a Man in the Brower attack?
involves an attack between the web browser and underlying operating system
What is a TCP wrapper?
are access control lists (ACLs) that either allow or deny certain networking services on a computer
What is PAM and what does it stand for?
Pluggable Authentication Modules. PAMs determine how a user is to be authenticated and whether there are password policies associated with the password database
What is Signature-based IDS (or Knowledge-based IDS)?
uses rules or patterns of known malicious traffic being searched for. Once a match to a signature is found, an alert is sent to your system
What is Anomaly-Based IDS (or Behaviour-Based IDS)
Views the activity that generated the traffic is far more important than the payload being delivered
What does IDS stand for?
Intrusion Detection System