AllFreePapers.com - All Free Papers and Essays for All Students
Search

Cyber Final

Autor:   •  July 20, 2015  •  Research Paper  •  561 Words (3 Pages)  •  886 Views

Page 1 of 3

What are two different types of attacks associated with password cracking?

Brute force- go through all the combinations

Dictionary- compare to words on dictionary

Hybrid – common substitutions

John the ripper is used for password cracking01

What is exfiltration? 

  • Taking unauthorized data from inside an organization or system

What is fishing?

  • Trying to get sensitive or confidential information via email

What is the difference between stateful and stateless protocols?

FTP – stateful (connection stays)

HTTP –stateless (state not maintained automatically)

What Keys do you have access to if you are person A and another person is person B?

  1. A private
  2. A public
  3. B private
  4. B public

Difference between symmetric and asymmetric key process?

  • Symmetric uses the same key and asymmetric using a different key for encryption than decryption

What type of encryption does PKI use?

  • Asymmetric

What is a Ceaser cipher and why is it used?

  • Simple cipher that substitutes other letters for letters in an alphabet. Used for communicating covertly

What would chmod 756 do? -> to change permissions chmod 756 filename.ext to rwx

  • Read (r) = 4
  • Write (w) = 2
  • Execute (x) = 1
  • First three (owner), second three (group), third three (other)
  • Changes file permissions so that the owner can rwx, group can read and execute (r-x), and other can read and write (rw-)

Based on the following password hashes, what type of Windows hash is being used?

KEEEQWASDSldFASDFADSFDSF

213123DSFSDF

NT Hash (newer)

LM (Lan Manager) – uses all uppercase and less than 14 characters

What would you type before a command in UNIX to run as a superuser? 

  • Sudo

What UNIX command would you use to show what directory you are currently working in?

  • Pwd

What does chmod do?

  • Change permissions

A black swan event has low occurrence and a high severity – thunderstorm

Why would you use a virtual machine to run a honeypot?

If an attacker compromises the machine, it can be easily reimaged and down

Explain the main difference between static and a dynamic IP address

Dynamic- IP changes overtime you connect

Static – stays the same – manually configure

Static is useful for shared network resources

SQL injection

Username

Password

SELECT * FROM users WHERE username =”” AND Password =”OR 1=1”

...

Download as:   txt (3.7 Kb)   pdf (69.8 Kb)   docx (7.4 Kb)  
Continue for 2 more pages »