Test 1 Flashcards

1
Q

Batch file scripting ends in what three letters

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In Batch file scripting how do you comment?

A

rem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Batch file scripting how do you output to the console?

A

echo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Batch file scripting how do you run a file or program?

A

start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the pause command do in Batch file scripting?

A

it paueses the program and gives you a prompt that says, “Press any key to continue”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you declare a variable in Batch file scripting?

A

set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does “if not” mean in Batch file scripting?

A

checking a false condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does “if exist” mean in Batch file scripting?

A

checking if a file or folder exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does “if defined” mean in Batch file scripting?

A

checking if a variable exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the extension of power shell script files?

A

.ps1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Power Shell- How to check the script execution policy set on your computer?

A

Get-ExecutionPolicy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Power Shell- What does “-whatif” do?

A

will tell you what the command will do without actually running the command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Power Shell- How to do a line comment?

A

#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Power Shell- How to do a block comment?

A

<# >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Power Shell- How to declare a variable?

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bash Scripting - How to open a new bash shell to execute the script?

A

!/bin/bash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bash Scripting - How to change the file permissions for the user, group, and other categories so the shell script can be executed?

A

Chmod ugo+x filename or chmod 755 filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does “chmod” do?

A

Chmod (change mode) modifies the file permissions of the given file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bash Scripting - how to declare a variable?

A

Variables are not declared, you just pick a variable name and assign it a value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Bash Scripting - How to access the value of a variable?

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bash Scripting - How to input a value?

A

read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Bash Scripting - How to do Arithmetic (Math)?

A

let

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bash Scripting - What is the basic if structure?

A

if [condition]
then
statements
fi

24
Q

What is a Hacker?

A

a general term used to refer to a person who uses advanced computer skills to attack computers

25
Q

What is a cybercriminal?

A

Are a loose network of attackers, identity thieves, and financial fraudsters

26
Q

What is Script Kiddies?

A

Attackers who use prewritten software and scripts to attack since that usually lack the knowledge of computers and networks

27
Q

What are Brokers?

A

Those who sell vulnerability information to anyone who is willing to pay for it

28
Q

What are CyberTerrorists?

A

Those who want to disrupt and cause panic to others motivated usually by ideological reasons

29
Q

What are Hacktivists?

A

Typically a loosely organized group that attacks as a form of protesting or retaliation

30
Q

State-Sponsored attackers

A

government sponsored attacks against another government or persons

31
Q

What are the steps of an Attack?

A

Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, Actions on Objectives

32
Q

What are the steps in defending against an attack?

A

Layering, Limiting, Diversity, Obscurity, Simplicity

33
Q

What is Cryptography?

A

scrambling information so that only authorized individuals can use it

34
Q

What is Encryption?

A

the process of changing the original data into scrambled data

35
Q

What is Decryption?

A

the process of changing the scrambled data back to it’s original data

36
Q

What is Plaintext?

A

unencrypted data that is the input for encryption or the output of decryption

37
Q

What is Ciphertext?

A

The scrambled and unusable output of encryption

38
Q

What is Cleartext?

A

usable (unencrypted) data that is transmitted or stored and is not intended to be encrypted

39
Q

What is a cipher or algorithm?

A

procedures based on a mathematical formula to encrypt and decrypt the data

40
Q

What is a key?

A

a Mathematical value entered into a cipher to produce the ciphertext

41
Q

What is Cryptoanalysis?

A

sophisticated statistical analysis on ciphertext to try to discover the underlying key to the cryptographic algorithm

42
Q

What is Steganography?

A

Hiding the existence of data

43
Q

an older (and somewhat obsolete) protocol used mostly for web servers and browers

A

Secure Sockets Layer (SSL)

44
Q

a newer and more secure protocol derived from SSL, mostly used for web servers and browers

A

Transport Layer Security (TLS)

45
Q

protocol used to access remote computers (typically Unix/Linux based)

A

Secure Shell (SSH)

46
Q

HTTP protocol that uses SSL or TLS encryption

A

Hypertext Transport Protocol Secure (HTTPS)

47
Q

protocol used for encrypted mail

A

Secure/Multipurpose Internet Mail Extensions (S/MIME)

48
Q

protocol to encrypt audio and video communications over the internet

A

Secure Real-time Transport Protocol (SRTP)

49
Q

A protocol suite for securing ip communications

A

IP security (IPsec)

50
Q

What is a man in the middle attack?

A

involves a threat actor who inserts themselves between two entities, intercepting the data they are sending each other

51
Q

What is a Man in the Brower attack?

A

involves an attack between the web browser and underlying operating system

52
Q

What is a TCP wrapper?

A

are access control lists (ACLs) that either allow or deny certain networking services on a computer

53
Q

What is PAM and what does it stand for?

A

Pluggable Authentication Modules. PAMs determine how a user is to be authenticated and whether there are password policies associated with the password database

54
Q

What is Signature-based IDS (or Knowledge-based IDS)?

A

uses rules or patterns of known malicious traffic being searched for. Once a match to a signature is found, an alert is sent to your system

55
Q

What is Anomaly-Based IDS (or Behaviour-Based IDS)

A

Views the activity that generated the traffic is far more important than the payload being delivered

56
Q

What does IDS stand for?

A

Intrusion Detection System