Test 1 Flashcards

(56 cards)

1
Q

Batch file scripting ends in what three letters

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In Batch file scripting how do you comment?

A

rem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Batch file scripting how do you output to the console?

A

echo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Batch file scripting how do you run a file or program?

A

start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the pause command do in Batch file scripting?

A

it paueses the program and gives you a prompt that says, “Press any key to continue”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you declare a variable in Batch file scripting?

A

set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does “if not” mean in Batch file scripting?

A

checking a false condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does “if exist” mean in Batch file scripting?

A

checking if a file or folder exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does “if defined” mean in Batch file scripting?

A

checking if a variable exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the extension of power shell script files?

A

.ps1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Power Shell- How to check the script execution policy set on your computer?

A

Get-ExecutionPolicy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Power Shell- What does “-whatif” do?

A

will tell you what the command will do without actually running the command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Power Shell- How to do a line comment?

A

#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Power Shell- How to do a block comment?

A

<# >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Power Shell- How to declare a variable?

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bash Scripting - How to open a new bash shell to execute the script?

A

!/bin/bash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bash Scripting - How to change the file permissions for the user, group, and other categories so the shell script can be executed?

A

Chmod ugo+x filename or chmod 755 filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does “chmod” do?

A

Chmod (change mode) modifies the file permissions of the given file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bash Scripting - how to declare a variable?

A

Variables are not declared, you just pick a variable name and assign it a value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Bash Scripting - How to access the value of a variable?

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bash Scripting - How to input a value?

A

read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Bash Scripting - How to do Arithmetic (Math)?

A

let

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bash Scripting - What is the basic if structure?

A

if [condition]
then
statements
fi

24
Q

What is a Hacker?

A

a general term used to refer to a person who uses advanced computer skills to attack computers

25
What is a cybercriminal?
Are a loose network of attackers, identity thieves, and financial fraudsters
26
What is Script Kiddies?
Attackers who use prewritten software and scripts to attack since that usually lack the knowledge of computers and networks
27
What are Brokers?
Those who sell vulnerability information to anyone who is willing to pay for it
28
What are CyberTerrorists?
Those who want to disrupt and cause panic to others motivated usually by ideological reasons
29
What are Hacktivists?
Typically a loosely organized group that attacks as a form of protesting or retaliation
30
State-Sponsored attackers
government sponsored attacks against another government or persons
31
What are the steps of an Attack?
Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, Actions on Objectives
32
What are the steps in defending against an attack?
Layering, Limiting, Diversity, Obscurity, Simplicity
33
What is Cryptography?
scrambling information so that only authorized individuals can use it
34
What is Encryption?
the process of changing the original data into scrambled data
35
What is Decryption?
the process of changing the scrambled data back to it's original data
36
What is Plaintext?
unencrypted data that is the input for encryption or the output of decryption
37
What is Ciphertext?
The scrambled and unusable output of encryption
38
What is Cleartext?
usable (unencrypted) data that is transmitted or stored and is not intended to be encrypted
39
What is a cipher or algorithm?
procedures based on a mathematical formula to encrypt and decrypt the data
40
What is a key?
a Mathematical value entered into a cipher to produce the ciphertext
41
What is Cryptoanalysis?
sophisticated statistical analysis on ciphertext to try to discover the underlying key to the cryptographic algorithm
42
What is Steganography?
Hiding the existence of data
43
an older (and somewhat obsolete) protocol used mostly for web servers and browers
Secure Sockets Layer (SSL)
44
a newer and more secure protocol derived from SSL, mostly used for web servers and browers
Transport Layer Security (TLS)
45
protocol used to access remote computers (typically Unix/Linux based)
Secure Shell (SSH)
46
HTTP protocol that uses SSL or TLS encryption
Hypertext Transport Protocol Secure (HTTPS)
47
protocol used for encrypted mail
Secure/Multipurpose Internet Mail Extensions (S/MIME)
48
protocol to encrypt audio and video communications over the internet
Secure Real-time Transport Protocol (SRTP)
49
A protocol suite for securing ip communications
IP security (IPsec)
50
What is a man in the middle attack?
involves a threat actor who inserts themselves between two entities, intercepting the data they are sending each other
51
What is a Man in the Brower attack?
involves an attack between the web browser and underlying operating system
52
What is a TCP wrapper?
are access control lists (ACLs) that either allow or deny certain networking services on a computer
53
What is PAM and what does it stand for?
Pluggable Authentication Modules. PAMs determine how a user is to be authenticated and whether there are password policies associated with the password database
54
What is Signature-based IDS (or Knowledge-based IDS)?
uses rules or patterns of known malicious traffic being searched for. Once a match to a signature is found, an alert is sent to your system
55
What is Anomaly-Based IDS (or Behaviour-Based IDS)
Views the activity that generated the traffic is far more important than the payload being delivered
56
What does IDS stand for?
Intrusion Detection System