Cyber Operator Flashcards

(222 cards)

1
Q

In order to execute a file in Linux the file must _____.

A

Be executable, contain executable code, and you must have permission to execute it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

With a umask of 022, which of the following permissions are assigned when creating a new file?

A

rwxr-xr-x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Linux this file is used to store hashed passwords and readable only by root.

A

shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is a set of standards carrying out wireless local area networks.

A

IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Windows 7 command can be used to perform a soft shutdown?

A

shutdown /s /f /t 00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system that gathers and analyzes information from within a computer or a network, to identify
possible violations of security policy, including unauthorized access, as well as misuse is known as:

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the default MIP2 firewall state prior to being connected to the network?

A

enabled and not allowing incoming connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(U//FOUO) What are the three sub-missions of a Cyber Protection Team (CPT)?

A

Survey, Secure, Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Windows command can be used to configure the IP address either statically or to use Dynamic
Host Configuration Protocol (DHCP)?

A

netsh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(U//FOUO) Which document prioritizes and outlines the options and actions available, both technical
and procedural, to provide a greater level of mission assurance for the supported commander’s
mission through the consolidation of all squad recommendations?

A

Risk Mitigation Plan (RMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you stop a TCPdump capture?

A

Use Control-C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is NOT contained in the CVA/Hunter Air Force Tactics, Techniques and
Procedures (AFTTP) 3-1?

A

Commercial Manuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of crew logs?

A

To maintain an accurate and detailed record of all significant events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ focus primarily on qualitative analysis of ISR employment to determine ISR contribution to
mission objectives.

A

Measures of Effectiveness (MOE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A program in which malicious or harmful code is contained inside apparently harmless programming
or data in such a way that it can get control and do its chosen form of damage is known as what?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is important to review _______________ during the sortie brief because it will affect the choice of
TTPs and the accomplishment of tactical tasks during sortie execution.

A

Intelligence Updates, Mission Partner Activity, Rules of Engagement, Crew and Mission Risks, All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In Linux, how are trusted and target IP addresses added or removed?

A

By editing the /etc/trusted.hosts and /etc/target.hosts files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Techniques are __________.

A

Non-prescriptive ways or methods used to perform missions, functions or tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____ focus on task execution and quantitative mission achievement.

A

Measures of Performance (MOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the Linux command for securely copying a file from a remote machine to
your home directory?

A

scp 10.10.20.100:/ios/data/assess/file.txt /home/usr/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Null sessions are __________.

A
an anonymous (no user, no password) connection to a freely accessible remote share called IPC$ on
Windows-based servers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Software applications that run automated tasks and can be remotely controlled, normally used in
DDoS are commonly referred to as what?

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When validating DIP sensor processes what command verifies that the processes are running?

A

/usr/local/bin/checkstatus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What type of malware spreads from computer to computer and has the capability to travel without
any human action?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which bit allows execution of an application as a member of this group?
SGID
26
Which interceptor platform consists of a single laptop, is used by one crew member and can run limited VMs concurrently?
Mobile Interceptor Platform (MIP)
27
Which of the following Deployable Interceptor Platform (DIP) sub-components serves as a data Collector and VM server?
DL-160
28
In VMware what do you press to exit a virtual environment?
CONTROL+ALT
29
Which of the following Deployable Interceptor Platform (DIP) sub-components is deployed on the MPNet and primarily captures and stores network traffic?
Cywarfius sensor
30
Which of the following are the default ports for web traffic?
80 and 443
31
What is the TCPdump option that saves the packet data to a file?
-w
32
(U//FOUO) Which Cyber Protection Team (CPT) squad analyzes the supporter commander's identified cyberspace dependencies, essential and critical assets and cyberspace key terrain (C-KT)?
Mission Protection
33
A type of password cracking where a word list is used against a given encrypted password.
Dictionary Attack
34
Which of the following is NOT a private or non-routable IP address?
172.168.1.1
35
In Linux, user account information is contained in which file?
/etc/passwd
36
Where are the Bro sensor logs kept?
DIP2
37
Which vi command will bring you into insert mode?
I
38
Which of the following is NOT a tasking document used for CVA/Hunter missions?
Task Management Tool (TMT) Tasker
39
Which interceptor platform consists of Cywarfius sensors, Informaiton Operations Platform (IOP), and fits in a hardened case?
Deployable Interceptor Platform (DIP)
40
How is the encrypted partition unmounted?
Double click the "UnMount..." desktop icon
41
PowerShell Cmdlets follow which naming convention?
Verb-noun
42
A path that contains the root directory and all subdirectories of the location is called?
Absolute Path
43
What could you use to redirect the output of a program to the input of another program on the command line?
Pipe (|)
44
``` Which of the following documents contains an abbreviated version of the amplified Ops Manual Technical Order (TO-1)? ```
CVA/Hunter Cybercrew Checklists / Crew Aides
45
Which command will allow you to run TCPdump to monitor activity on a particular subnet?
tcpdump -w traffic net 10.10.20.0/24
46
Which of the following is NOT a rule for CVA/Hunter emergency procedures?
Act Immediately
47
Which of the following is the default port for SMTP?
25
48
What is a smurf attack?
Large amount of ICMP echo traffic to a network broadcast address with a spoofed source IP set to a victim Host
49
Which of the following is the default port for Telnet?
23
50
In Windows, what command will enable the firewall and block incoming connections?
> netsh firewall set opmode enable disable
51
What does the following nmap scan do. nmap -O 10.10.20.1
Determines the OS of the machine
52
Traffic capture tools such as TCPdump and Wireshark provide _____ accountability of actions performed on the weapon system.
Logical
53
When validating GIP functionality which of the following are operator responsibilities during initial weapon system configuration? (I) Verify connectivity to an operational VM; (II) Modify Access Control Lists (ACLs); (III) Install ArchSight Linux management console; (IV) Verify that an operational VM has the appropriate IP in accordance with SPINS
I and IV
54
A file has an octal value of 755 this means:
The owner can read, write and execute; the group can read and execute; others can read and execute
55
A coworker uses the smb_share.pl to create a share. You are on a windows machine and using the net use command to mount the share. What user do you use when attempting to mount the share?
root
56
Which drive letter is used for the encrypted partition?
X:\
57
Which of the following Deployable Interceptor Platform (DIP) sub-components primarily serves as a deployable network intrusion detection system?
IOP
58
What type of information in a tactical level mission tasking document describes communication requirements and reporting?
Communication Contracts
59
What could you use to redirect the output of a program to a file on the command line?
Greater than symbol (>)
60
Which of the following is the Cisco IOS command to copy the running configuration to the starting Configuration?
copy run start
61
What is the Unix environment variable which automatically sets file permissions on newly created Files?
UMASK
62
(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG), information and mission impact pertaining to
SECRET
63
Traceroute executes by ___________.
increasing the time-to-live value of each successive batch of packets sent
64
A software system that consists of a program or combination of several programs designed to hide or obscure the fact that a system has been compromised is known as what?
A rootkit
65
(U//FOUO) Which Cyber Protection Team (CPT) squad detects, illuminates and defeats previously unknown adversary activity within a specified area of responsibility?
Discovery and Counter Infiltration
66
What is the SAM (Security Accounts Manager) file?
A database stored as a registry file containing users' passwords in a hashed format
67
What does the broadcast address do?
Allows for information to be sent to all machines on a given subnet
68
A malfunction is designated an emergency when ___________.
individual troubleshooting efforts do not result in a weapon system fix.
69
What is a Tactics Improvement Proposal (TIP)?
Comprehensive idea to improve the military capability of a fielded system, overcome a tactical deficiency or meet an emerging operational need
70
What does the following command do: C:\> psexec \\10.10.20.1 cmd
Launches an interactive command prompt
71
FTP uses which of the following ports?
20 and 21
72
Tactics are ______.
The employment and ordered arrangement of forces in relation to each other.
73
Which vi command will delete one line?
dd
74
Which of the following is NOT a primary purpose of a Tactics Improvement Proposal?
To request modification or acquisition of hardware or software
75
Which of the following items must be covered in a change over brief?
Factors of the current operational/tactical situation, Critical reports and findings from ending sortie, Active and planned mission partner activity
76
(U//FOUO) Which Cyber Protection Team (CPT) squad assesses an organization's security posture by closely resembling adversary offensive cyberspace activities in their processes and execution?
Cyber Threat Emulation
77
What are the two major DIP assembly components?
Server (DIP1) and Sensor (DIP2)
78
Two types of IDS are:
Network-based (NIDS) and host-based (HIDS)
79
What is the iptable option to clear all firewall rules?
-F
80
What is not a default chain for iptables?
ACCEPT
81
Which of the following octal codes allow a file to execute as the owner of that file?
4777
82
Which iptables target denies a packet and does not send back a rejection?
DROP
83
What is the technique whereby the sender of a packet can specify the route that a packet should take through the network?
Source routing
84
Which of the following is NOT contained on the PEX sortie details report
Go/No Go Status
85
According to the communication contract shown, once maintenance implements a fix, who is responsible of assigning an operator to conduct an operational check to determine the weapon system Status?
cyberspace operations controller
86
How is the encrypted partition mounted?
Double click the "Mount X Drive" desktop icon and enter the password
87
The accuracy of IPs and MAC addresses are of critical safety concern because _________ .
They are used as targeting information
88
Which of the following is the Linux command for logging into 10.10.20.100 as assessor?
ssh assessor@10.10.20.100
89
Which of the following are key elements in a tactical level mission tasking document?
CVA/Hunter IP Ranges, Rules of Engagement (RoE), Cyberspace Key Terrain (C-KT), Tactical Objectives, All of the Above
90
Which vi command will allow you to save and quit?
:wq
91
You want to create a new share using the smb_share.pl script. You attempt to execute the command but is tells you the "command is not found". What might be the cause?
You did not mount the encrypted partition
92
Using Wireshark to follow a TCP Stream means:
You can view data from a TCP conversation
93
Exploitation of a valid computer session where an attacker takes over a session between two computers is known as what?
Session Hijacking
94
(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG), a report on vulnerabilities associated with a specific NIPR AF information system has what Classification?
CONFIDENTIAL
95
Which bit allows the execution of an application as the owner of that file?
SUID
96
Which of the following is the proper way to ensure you are green on your CIF Go/No Go?
complete and sign off the CIF in PEX before the sortie
97
Which of the following Nmap commands would perform a ping sweep of 10.10.20.0/24 subnet, without resolving IP addresses to hostnames?
nmap -n -sn 10.10.20.0/24
98
In Linux, which of the following represent the current directory you are in?
A single dot (.)
99
Which of the following is NOT a purpose of a sortie debrief?
Determine whom to attribute mission failures
100
You just performed a FIN scan with nmap against a target. The machine sends back no response for a particular port. This means that the port is _____.
Open
101
Which command can be used to perform a soft shutdown of a Linux machine?
init 0
102
Which directory normally holds log files?
/var/log
103
For Ubuntu Linux, what command is used to turn off the firewall?
fw_iptables.pl allow -i eth0
104
You are logged into the Linux side of the clone, which command gives you a root shell?
sudo -s
105
What type of information in a tactical level mission tasking document describes the agreement with the mission partner on what cybercrew actions are approved during CVA/Hunter missions?
Rules of Engagement (RoE)
106
Which Linux command is used to connect to a share?
mount
107
Which vi command will delete one character?
x
108
With a umask of 002, which of the following permissions will be assigned when creating a new Directory?
rwxrwxr-x
109
Writing hidden messages in such a way that no-one, apart from the sender and intended recipient, suspects the existense of the message, a form of security through obscurity is known as what?
Steganography
110
Procedures are __________.
Standard, detailed steps that prescribe how to perform specific tasks.
111
Which interceptor platform consists of Thin Clients, a BladeCenter, is use by multiple crew members and contains multiple NICs plus Lights-out Management?
Garrison Interceptor Platform (GIP)
112
Which of the following are NOT part of proper safety procedures?
Replace components inside the equipment to prevent mission failure.
113
Which of the following is NOT a purpose of a CVA/Hunter cybercrew checklist / crew aid?
Replaces the amplified TO-1
114
Which of the following octal codes allow a file to execute as the group of that file?
2777
115
The environment variable that contains a list of directories the shell will look for commands is called:
PATH
116
Which of the following steps come before accessing the Virtual Machines on the MIP2?
Mounting the encrypted drive
117
On a Cisco IOS device, which of the following symbols corresponds to Privileged EXEC (enable) Mode?
#
118
How many usable IP addresses are there in a C class network?
254
119
Which key do you use in vi to return to command mode?
Esc
120
Which is the octal value for the owner can write; the group can read and execute; others can read?
254
121
Which of the following is NOT a valid PowerShell command for viewing help information?
read-help
122
Which command in Linux, displays the default gateway?
route
123
Which of the following is the Linux command for securely logging into 10.10.20.100 as assessor?
ssh 10.10.20.100
124
In Linux, a hidden file starts with a _____.
period
125
A path that begins from the user’s current location is called:
Relative Path
126
According to the communication contract shown what does the operations controller do when a crew member notifies them via the chat program that they have a maintenance issue?
The operations controller communicates to both maintenance and the crew commander by issuing a maintenance ticket.
127
Admin$ serves as ____________.
the hidden share that points to the windows folder
128
Which of the following does not describe the clone?
A computer you can install any software you need without authorization to complete your mission
129
(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG), information pertaining to cyberspace operations functions and processes with reference to mission, capability or location has what classification?
UNCLASSIFIED//FOR OFFICIAL USE ONLY
130
Which Windows command is used to connect to a share?
net use
131
Which port should be allowed through the firewall in order to enable file sharing?
445
132
(U//FOUO) Which Cyber Protection Team (CPT) squad performs targeted evaluations to review the effectiveness of the current cyber security program and provides reviews of cyber assets based on DOD policies and regulations?
Cyber Readiness
133
A type of attack where a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system is known as what?
Distributed Denial Of Service
134
``` When validating DIP sensor processes what running processes must be verified? I. Bro II. Snort III. tcpdump IV. nessus ```
I, II and III
135
(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG), descriptions of cyberspace operations, functions, processes, systems and tools associated with standard commercial capabilities without reference to mission, capability or location have what Classification?
UNCLASSIFIED
136
(U//FOUO) Which document outlines the residual mission risks and illustrates how CPT capabilities will be integrated into and coordinated with the local cyberspace defenders to enhance the cyberspace defense of a supported commander's mission?
Mission Defense Plan (MDP)
137
In Windows, which command can be used to change the hostname?
wmic
138
Which of the following documents contains weapon system capabilities and limitations as well as threat considerations?
CVA/Hunter Air Force Tactics, Techniques and Procedures 3-1
139
In Red Hat Linux, what command will turn the firewall on and not allow incoming connections?
firewall
140
The Xmas scan with nmap means:
The FIN, PSH, URG flags are set
141
You press CONTROL+ALT+_____ to log into a locked Windows virtual machine.
INSERT
142
Which command sets a file to be executable?
chmod +x file
143
Which is the octal value such that the owner can read and execute;,the group can write and execute and others can execute?
531
144
You have just used the smb_share.pl script to create a shared directory for the team. Where is that directory created on your system?
In the working directory
145
A file has an octal value of 644 this means:
The owner can read and write; the group can read; others can read
146
What is a "NTFS Alternate Data Stream"?
A separate buffer to hold information on a per file bases found on a Windows machine
147
In classful network design, in which class network is 191.50.0.0 defined?
Class B
148
If you are unable to successfully connect to a share using a Linux machine, which file could you check to verify the share configurations?
/etc/samba/smb.conf
149
Which of the following describes authorities for foreign intelligence operations?
Title 50
150
Which of the following is the default port for DNS?
53
151
(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG), association of an IP address which poses a threat to national security to a foreign nation is at what Classification?
SECRET
152
During a debrief, determining the debrief focal point (DFP) is ___________.
a process of determining aspects of mission planning and execution impeding achievement of tactical Objectives.
153
In Linux, which file contains the system’s network parameters such as IP address, subnet mask and default gateway?
/etc/network/interfaces
154
Which of the following documents describes general CVA/Hunter equipment maintenance Procedures?
CVA/Hunter Technical Order (TO-2)
155
Which netstat option displays all connections and listening ports?
-a
156
Which of the following are default NETBIOS ports?
137, 139, and 445
157
Which of the following is NOT a required element of a mission/sortie brief?
Crew Information Files (CIF)
158
The Nmap option "-O" performs what function?
OS detection
159
____ is an open-source and/or licensed signature driven IDS that requires specific syntax to be followed in order for the signature to be deployed to the sensor successfully.
Snort
160
Which of the following is NOT a reason to review weapon system status during a sortie brief?
The operator will be primarily responsible for fixing major weapon system issues.
161
How is mounting to a local drive within a virtual machine accomplished using Vmware?
In the VMware GUI click 'VM Setting' then 'Shared Folders' and add the drive's file path
162
A type of password cracking where each possible combination of letters, numbers, and etc. are used to find the passsword.
Brute Force
163
On a Cisco IOS device, which of the following symbols corresponds to User EXEC mode?
>
164
Which of the following is the default port for POP3?
110
165
What are the responsibilities of an oncoming crew member during a crew change over brief?
Ensure change over checklists are accomplished, Ask questions as applicable to ensure mission effectiveness, Remain attentive to crew commander change over briefing, All of the above
166
You are traveling with your clone. While boarding the plane, a flight attendant states that the laptop must be stowed below. What should you do?
Remove the hard drive from the computer prior to handing over the laptop
167
In Linux, you can search for a file with which two commands?
find and locate
168
What is a SYN Flood?
Using up all processes on a particular system, starting a handshake but not finishing
169
Software for privilege users is located in which directory?
sbin
170
What type of virtual machine network adapter configuration creates a private network that is completely contained within the host computer?
Host-Only
171
``` Select the correct order of steps in a debrief. (I) Determine the Root Cause (RC) of the Debrief Focal Point (DFP); (II) Develop the Lesson Learned (LL) with and Instructional Fix (IF) to address the Root Cause (RC); (III) Determine Contributing Factors (CF) related to the Debrief Focal Point (DFP); (IV) Reconstruct an event and identify the Debrief Focal; Point (DFP) ```
IV, III, I, II
172
Which of the following is NOT a key element in a tactical level mission tasking document?
Tactics, Techniques and Procedures (TTPs)
173
Tactics, Techniques and Procedures (TTPs) are _______ in nature.
authoritative
174
What net command do you use to start the server service?
net start server
175
TCP stands for
Transmission Control Protocol
176
Which of the following best describes the order of precedence for iptables’ rules in Linux?
Individual reject, accept, block all
177
Flooding a switch with numerous requests causing the switch to lose track of which MAC address is on which port, thus causing it to reset into learning mode is known as what?
MAC Flooding
178
Why is it important to keep operator notes and crew logs?
It provides a record of activity that can be reviewed to deconflict issues involving the crew and the mission Partner
179
Which is connection-oriented protocol?
TCP
180
What Linux command prints the current network configuration to the screen?
ifconfig
181
A type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the pages viewed by others is known as:
cross-site scripting
182
Which of the following is NOT an element of a mission/sortie brief?
Squadron Announcements
183
What is a netmask?
A 32-bit number used to divide an IP address into subnets
184
During a debrief, determining an instructional fix is ___________ .
a process of determining how to prevent a debrief focal point from happening again.
185
The purpose of ___ is to serve as a network based IDS used to monitor MPNETs in a passive (nonblock) Mode.
Bro
186
Which properties of the Windows VM network device must be on in order to allow the creation of a mission share?
"Client for Microsoft Networks" and "File and Printer Sharing for Microsoft Networks"
187
In classful network design, which class is 126.0.0.0 network defined in?
Class A
188
Which vi command will quit?
:q
189
In Linux, what is the difference between permanent and temporary IP address configuration?
A permanent IP configuration ensures the host will reboot with the same IP whereas temporary does not
190
Configuration files are normally located in which directory?
etc
191
Which of the following is NOT part of the procedures to sign a crew information file (CIF)?
Email Stan Eval that CIF has been signed off
192
Which of the following is the default port for SNMP?
161
193
(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG), information and mission impact pertaining to the availability of services or network outages for AF information systems has what classification?
SECRET
194
Which of the following IS a tasking document used for CVA/Hunter missions?
Cyber Tasking Order (CTO)
195
During a debrief, event reconstruction is ____________
a process of looking back at the mission and determining the facts/observations
196
What is a Teardrop DoS attack?
Sending mangled IP fragments with overlapping, oversized, payloads to the target machine
197
In Windows, what command will enable the firewall and allow exceptions?
> netsh firewall set opmode enable enable
198
In BASH script, which is an acceptable first line to the file?
#!/bin/bash
199
What is the Windows SAM?
A database stored as a registry file containing users passwords in a hashed format
200
Which of the following is a tool that analyzes ICMP probe responses to perform OS fingerprinting?
xprobe2
201
A covert channel is ______________.
the transfer of information hidden within the medium of a legitimate communications channel.
202
Who is responsible for the configuration management of the MIP2 clone image?
A member of the maintenance flight
203
Which of the following describes authorities for national guard?
Title 32
204
You have mounted the encrypted partition in Linux, where is the 'working directory' located?
/ios/data/assess
205
Which of the following commands will securely copy a file from your machine to a remote machine?
scp file user@remoteIP:/tmp
206
The ___ is a collection of servers and devices that provide sustainment, maintenance, and support for CVA/Hunter remote operation.
GIP
207
How does a hub function?
Any message that comes in one port is sent to all ports
208
(U//FOUO) Which Cyber Protection Team (CPT) squad conducts terrain mapping and works closely with the organic network operators and defenders to plan, train, and deploy mitigations?
Cyber Support
209
Linux is ____ .
case sensitive
210
Which directory contains virtual files with kernel information?
proc
211
What is Nessus?
A vulnerability scanner
212
UDP Stands for ________.
User Datagram Protocol
213
A malfunction is characterized by _____________.
Any weapon system component degradation limited to an individual’s VM or host.
214
Which of the following provides authority for active duty warfighting?
Title 10
215
A TCP Null scan with nmap means:
No flags are set
216
Which of the following is not a Layer 3 protocol used by Cisco IOS devices?
STP
217
Which of the following is a rule for CVA/Hunter emergency procedures?
Maintain Control
218
A special text string for describing a search pattern is known as what?
Regular Expression
219
What protocol is not vulnerable to sniffing?
ssh
220
In Ubuntu Linux, what command is used to enable the firewall?
fw_iptables.pl enable -i eth0
221
Broadcasting fake ARP messages with the aim is to associate the attacker's MAC address with the IP address of another node is known as what?
ARP Spoofing
222
An intrusion detection system that is behaving actively, meaning it can block traffic in real-time, is commonly referred to as:
Intrusion prevention system