Unit 3 Vocabulary Flashcards

1
Q

home directory

A

every user has a “home directory” that bears their username. This is similar in concept to My Documents folder in Windows. (Linux default: /home/username/)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Flags

A

(to Linux commands) - options to modify command behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control

A

The selective process of allowing or restricting the availability of a recourse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Owner

A

The user that owns the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Group

A

A collection of users who have access to the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Other/World

A

Everyone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Read (r)

A

Read a file or look inside a directory, matrix # - 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Write (w)

A

Write or modify a file or modify a directory’s contents matrix # - 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Execute (e)

A

Execute or run a file, or go into a directory (using, for example, cd) matrix # - 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Permission Matrix (drwxrwxrwx)

A

d = directory or file, 1st rwx = owner permissions, 2nd rwx = group permissions, 3rd rwx = others permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

.sh

A

A script that executes commands when ran

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hidden files in Linux (begin with a .)

A

Hidden files don’t show up for the first ls command, only for ls -a or ls -la (ex: /.hideme)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open source

A

Software that is freely available to anyone who wants to use it. Users can modify it and distribute it however they want

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GNU Privacy Guard (gpg)

A

A command-line tool that lets you encrypt files with a variety of encryption algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shell

A

A program that allows a user to enter commands to interact with an operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spawned

A

The act of starting or launching a process. The new process is a child process of a parent process; in other words, a parent process “spawns” a child process.

17
Q

Background Process

A

A process in UNIX that runs without user input

18
Q

Root Directory

A

In UNIX, the top-most directory denoted as /

19
Q

Open Systems Interconnection (OSI) model

A

A collection of many network protocols. It uses abstraction at different levels of detail to define how network components see, interpret, and process network traffic.
Layers 1-7 (lowest first) acronym: Please Do Not Teach Students Pointless Acronyms
Layers 1-7 (lowest first): Physical, Data Link, Network, Transport, Session, Presentation, Application

20
Q

Security Baseline

A

A starting point for data analysis. It is the initial data set used in later comparisons

21
Q

Subnet

A

A smaller part of a larger network

22
Q

Reconnaissance

A

The first phase of ethical hacking, which involves probing the network to understand its structure and to see what services are open and running

23
Q

Scanning

A

The second phase of ethical hacking, which involves taking a closer look at the services and software running on the host

24
Q

Compromise

A

The third phase of ethical hacking, which involves launching exploits at targeted vulnerabilities to see if they are genuine exposures on the system.

25
Q

Remediation

A

The fourth and final phase of ethical hacking where the security professionals fix the system vulnerabilities uncovered in the previous phases.

26
Q

Nessus

A

A security tool used to scan a system or network for known vulnerabilities. When a vulnerability is reported or discovered anywhere in the world, the engineers at Nessus add it to their program as a “plug-in”. An example of a vulnerability with a Nessus plug-in is a buggy version of MySQL that permits a DoS attack. Using its list of plug-ins, Nessus scans a system to determine whether this or other vulnerabilities are running on a system.

27
Q

Metasploit

A

A collection of tools referred to as a framework. Pen testers use the Metasploit framework to perform penetration tests to help them develop exploits and build custom tests to asses weaknesses and vulnerabilities in a system or network. The Metasploit framework is very powerful and should be used in the most disciplined manner. The framework includes a console, a command line, and a web interface.

28
Q

Security framework

A

A security framework is a series of defined processes used to test and expose the security that are in place on a system.

29
Q

Packet

A

A general term for a chunk of data

30
Q

Zenmap

A

A security tool that is the graphical version of a command-line tool that scans a network for hosts, open ports, and services.

31
Q

Address Resolution Protocol (ARP)

A

Used to determine a device’s physical address (usually a MAC address) and map it to an IP address. ARP messages are implemented in layer 2, the data link layer.

32
Q

Bash format

A

[user_name]@[machine_name]:[directory]$
beta@PLTW:~/Templates$
User beta is logged in to machine PLTW and the present working directory is Templates in their home folder (~/Templates)

33
Q

UID

A

id of the user that launched the process

34
Q

PID

A

Process ID of the unique process

35
Q

PPID

A

Parent process ID that started or spawned this process

36
Q

CMD

A

process or command name, often contains directory path to the executable

37
Q

ftp port

A

21

38
Q

ssh port

A

22

39
Q

http port

A

80