Phase 1 Flashcards

1
Q

What port is typically used for SSH?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is a TCP three way handshake?

A

SYN - SYN/ACK - ACK packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a pcap file?

A

A saved Packet CAPture file that can be analyzed offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As a Cybersecurity tool, what does Wireshark allow us to do?

A

Analyze data packets on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Will using a pcap file can help us spot an adversary in real time?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can wireshark be used to view network traffic on any network in the world from a single computer?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does NIC stand for?

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does MAC stand for?

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The loopback address is a very important address for computer communications. What is an example of a loopback address?

A

127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the ping command do?

A

Verifies connectivity between two systems using the ICMP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of a valid PUBLIC IPv4 address?

A

1.0.0.0 to 127.0.0.0
128.0.0.0 to 191.255.0.0
192.0.0.0 to 223.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an example of a valid PRIVATE IPv4 address?

A

10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what would you see using the cat command on an /etc/hosts file

A

simple text file that maps hostnames to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the decimal 192 in Hex?

A

C0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is likely to be a Home directory?

A

/home/user1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the command ip a do?

A

Shows the IP Addresses associated with all the NICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is 0xFF in binary?

A

1111 1111

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name the directories to their common functions:
/bin –
/etc –
/usr –
/mnt –
/home –

A

BINARIES
configuration
user binaries
mounts
user data folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The command ls -l gives what kind of listing?

A

Long (detailed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The command ls -a gives what kind of listing?

A

All files, even hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are installing an application that needs to write data to a log file. The filename is appout.log and you are told the program will error out if the file does not already exist. What command can you use to ensure you won’t have a problem?

A

touch /var/log/appout.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What will ALWAYS be the symbol for the current directory in a Linux/Unix terminal?

A

(.)(.)

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of these are located in the root directory of a fresh install of Linux ? (Choose 2)

A

/home
/usr
/conf
/etc
/titties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Within a Linux Terminal, which command would display hidden files in the current directory?

A

Ls -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Match the following commands to their functions in VI/VIM. Assume you are in command mode, unless otherwise stated. O (lowercase)-- O (capital) – :w – :q! – / – dw – dd – i – a – Esc (while in insert mode) –
adds a line below the cursor and puts vi in insert mode adds a line above the cursor and outs vi in insert mode saves the file quits the file without saving searches for text deletes the current word deletes the current line insert mode before the cursor insert mode after the cursor changes to command mode
25
What does the ~ do when you type "cd ~" in the command line?
Takes you to your home directory
26
Which command will add a user and setup the account's home folder and other settings automatically?
adduser
27
What does the command su stand for?
Switch user
28
What does the touch command do?
Creates a file, if it doesn't exist, or updates the timestamps if it does
29
Typing cd with no parameters is the equivalent of which command?
cd ~
30
Which command adds a line below the current line on in the VI editor?
o
31
What does the VI command :w do (not :wq)?
Saves the file
32
Which command puts the VI editor into edit mode?
i
33
What does the D command do in the VI editor?
Deletes from the cursor to the end of the line.
34
Can the :w! command be used to overwrite all files, even read-only system files?
False
35
What does the command nc or netcat with no parameters do?
Shows the usage (options) for the command
35
What is the \r character in an HTTP GET request?
Carriage return
36
If a user on our network is surfing to an HTTP page and we can capture the network traffic, we can potentially view the entire page as the user would see it?
True
36
What is netcat used for?
Network Communications using TCP or UDP
36
What is the \n character in an HTTP GET request?
Line feed
37
Which command will stop a process? (linux)
kill
37
What does the pvscan command do?
Displays the Physical Volumes present
38
LVM can be added to an existing Linux system that does not currently have LVM configured.
True
39
Which command can be used to stop a process by name?
pkill
40
What is the purpose of a Samba file share?
Allows file and print services between users on Windows and Linux servers
41
In which folder and file are the Linux Samba passwords stored by default?
/etc/samba/smbpasswd
41
Are samba shares read only?
False
42
In which folder is the Linux Samba configuration file located?
/etc/samba
42
VirtualBox Shares can be used to transfer files between the host computer and the virtual machines
True
43
What is a Linux shell?
An interface between a user and the operating system
44
Is "../Documents" an example of an Absolute Path or a Relative Path?
Relative path
45
What directory does "/" direct to?
The root directory
46
Which of the following Linux commands CANNOT be used to create a file?
cd
47
If I am currently in "/root/home/testuser/Documents" which directory would the command "cd ../../" take me?
/root/home
47
The command "ls -l" lists all files in your current directory also lists them in the long listing format.
False
48
What is a bash script?
A series of commands saved in a file that can be run at any time
48
What does a semicolon do in an alias command?
Allows multiple commands to be strung together
49
An alias can be used to provide a shortcut to another alias.
true
50
Aliases can be used within bash shell scripts
True
51
Both Aliases and Bash Shell scripts can be used to run multiple commands.
True
52
While attempting to add a line of data to a file, the following command is issued echo "New Data" > datafile but the operation fails with an "Operation not permitted" error. The command lsattr is executed and the following is the results: -----a--------e----- ./datafile What command might work to add the data to the datafile?
echo "New Data" >> datafile
53
How are daemon and processes related?
A daemon is a Linux process that is running in the background and is not interactive
54
When setting permissions on a file, we can give an individual user ownership of a file using the chown. If we have multiple users, we can create a group and use chgrp to give the entire group ownership permissions on that file. Then we can use the chmod command to set the read, write and execute permissions for the owner, group and everyone else (world). Which command would give only a files group execute permissions?
chmod g+x
55
What is the difference between a "Soft" and "Hard" link?
Hard links point to the data (inode) while soft links point to the name (of the inode)
56
What is the difference between "systemctl start " and "systemctl enable "?
"systemctl start" is used to start the service immediately, while "systemctl enable" will start when the system is rebooted
57
It is possible to filter ARP traffic in Wireshark.
True
58
What does the acronym ARP stand for?
Address Resolution Protocol
59
What items are included in an Ethernet II frame?
Type, source address (MAC), destination address (MAC)
60
From Layer 1 through layer 7, what are the ENCAPSULATION components called?
Layer 5-7 (Session, Presentation, Application) – data Layer 4 (Transport) – segment Layer 3 (Network) – packet Layer 2 (Data Link) – frame Layer 1 (Physical) – bits
61
Identify the layers of the OSI Model
LAYER 7 – APPLICATION LAYER 6 – PRESENTATION LAYER 5 – SESSION LAYER 4 – TRANSPORT LAYER 3 – NETWORK LAYER 2 – DATA LINK LAYER 1 – PHYSICAL
62
How big is a MAC address? Hint: In HEX a MAC address might look like: 08:00:27:AC:64:0A
6 Bytes (48 Bits)
63
What is the difference between HTTP and HTTPS?
HTTPS uses Security Certificates to encrypt the session, while HTTP is unencrypted
64
Which port is commonly used for hypertext transfer protocol traffic?
80
65
Which of these typically follows the three-way TCP handshake in an HTTP stream?
GET / HTTP/1.0
66
What is TCP Segmentation?
Breaking a longer message into segments
67
A colleague complains that the internet is down. Upon examination, you discover the network cable has become dislodged from the ethernet port. What OSI layer was the problem?
LAYER 1
68
How many bits are in a IPv4 address?
32
69
What is hypertext?
Structured text that uses logical links between nodes
70
What is Network Address Translation?
Manages internal (private) IP addresses and maps them to an external (Public) IP address and port
71
A 10MB device cannot communicate with a 1GB device
False
71
What do the following protocols do DNS – ARP – ICMP – DHCP –
RESOLVE NAME TO IP ADDRESS RESOLVE IP TO MAC ADDRESS ECHO REQUEST/REPLY LAN BROADCAST REQUESTING IP ADDRESS
72
What are the Encapsulation components to the following headers? FRAME– PACKET – SEGMENT –
ETHERNET HEADER IP HEADER TRANSPORT HEADER
73
Identify the components of the URL https://www.google.co.uk/ Protocol: Domain: Generic Top Level Domain: Country Top Level Domain:
https google co uk
74
The command "ls -l" lists all files in your current directory also lists them in the long listing format.
False
75
The command "top" prints the first 10 lines of a file onto the terminal.
False
76
Which of these is a Linux Security Tool?
SeLinux
77
If I am currently in "/root/home/testuser/Documents" which directory would the command "cd ../../" take me?
/root/home
78
Typing "vi" into your terminal and having it run "vim" is an example of what?
Aliases
79
Which of these is not part of the CIA Triad?
Authenticity
80
What directory does "/" direct to?
The root directory
81
Which package manager does a Debian machine use?
apt or apt-get
81
Which of the following Linux commands CANNOT be used to create a file?
cd
82
What are examples of Virtualization?
cloud, hypervisor
83
Which command would remove only a files group execute permissions?
chmod g-x
84
Which command would exit VIM without saving?
:q!
85
An alias can be used to provide a shortcut to another alias.
True
86
Which command would delete from the cursor to the end of the line in VIM?
D
87
Which of the following is likely to be a Home directory?
/home/testuser
88
Which Linux directory contains configuration files?
/etc
89
The command ll is an example of what?
Alias
90
What is the purpose of a Samba file share?
Allows file and print services between users on Windows and Linux servers
90
Within a Linux Terminal, which command would display additional details about files in the current directory?
ls -l
91
VirtualBox Shares can be used to transfer files between the host computer and the virtual machines
True
91
Virtual Machines can be reconfigured, for example by adding extra CPUs, hard drives, or memory, easier than a physical machine.
True