Task 2
What do you call a cryptographic method or product considered bogus or fraudulent?
Snake oil
.
What is the name of the command replacing netstat
in Linux systems?
ss
Task 3
How would you limit your Google search to PDF files containing the terms cyber warfare report?
filetype:pdf cyber warfare report
.
What phrase does the Linux command ss
stand for?
socket statistics
Task 4
What is the top country with lighttpd servers?
United States
.
What does BitDefenderFalx detect the file with the hash 2de70ca737c1f4602517c555ddd54165432cf231ffc0e21fb2e23b9dd14e7fb4
as?
Android.Riskware.Agent.LHH
Task 5
What utility does CVE-2024–3094 refer to?
xz
Task 6
What does the Linux command cat
stand for?
concatenate
.
What is the netstat
parameter in MS Windows that displays the executable associated with each active connection and listening port?
-b
Task 7
You are hired to evaluate the security of a particular company. What is a popular social media website you would use to learn about the technical background of one of their employees?
.
Continuing with the previous scenario, you are trying to find the answer to the secret question, “Which school did you go to as a child?”. What social media website would you consider checking to find the answer to such secret questions?