Midterm Kahoot - Hsanokklis/2022-2023-Tech-journal GitHub Wiki
- From the CIA cyber security framework, what does the 'A' stand for?
- Classified and Top secret are related to which Access Control model?
- Someone else opens a laptop and reads a file about salaries. What part of CIA was just impacted?
- Symmetric Keys have these things in common except:
- What type of attack is related to this: ping 192.168.2.9 && cat /etc/passwd ?
- Someone else modified your database. What principle was just impacted the most?
- Which one of the follow cipher algorithms is symmetric?
- What type of attack is related to this: <script>alert('hi');</script> ?
- Which malware type uses a network of programs running under command and control?
- What type of attack is related to this: 1' OR 1=1# ?
- Which malware type uses self-replicating malicious software to itself?
- Which one of the follow cipher algorithms is not asymmetric?
- What item hides data within an image or sound?
Malware with malicious code embedded inside non-suspecting files are which type?
- To send an encrypted message with asymmetric, you encrypt the message with their private key.
- A Certificate Authority ...
- Allowing users to enter anything into data entry forms creates security vulnerabilities.
- You see a hash which is 40 characters long. Which hashing algorithm was used?
- AAA is another framework triad representing everything except:
- In Windows, what permissions would you pick to Read & Change a file, but not Create one? (2)
- The Enigma machine used Asymmetric encryption.
- To send an authentic message with asymmetric, you encrypt the message with their private key.
- You see a hash which is 32 characters long. Which hashing algorithm was used?
- Which Access Control Model is most common in Microsoft, Mac & Linux?
- Port Math: What does HTTP + DNS - SSH=?