Questions and CORRECT Answers
/ qn - CORRECT ANSWER - Don't launch with a graphical user interface.
/i - CORRECT ANSWER - Don't try to run as administrator, run as a normal user instead
(this won't matter because of AlwaysInstallElevated).
/quiet - CORRECT ANSWER - Don't show the user any messages.
1024?! - CORRECT ANSWER - 1 kilobyte = 1024 bytes. IEC introduced KiB instead: 1
byte is 8 bits. 1 kibibyte (KiB) is 1024 bytes. 1 mebibyte (MiB) is 1024 kibibytes. 1 gibibyte
(GiB) is 1024 mebibytes. 1 tebibyte (TiB) is 1024 gibibytes.
Active Directory - CORRECT ANSWER - A system that allows the server to communicate
with Windows desktops, allowing the administrator to easily configure all the connected
desktops from one location, amongst other uses which we will cover in future modules. Active
Directory allows administrators to configure settings on Windows desktops that are connected to
a Windows server.
Adding a new user - CORRECT ANSWER - Adding a new user is as simple as running:
net user /add <username> <password> This command will create a new user and set the
password to what you specified. You can do so much more when creating users this way, such as
configuring account expiry and setting times where the account can log on.
Add-ins - CORRECT ANSWER - Microsoft Word allows for third parties to write 'add-
ins', which extend the functionality of Microsoft Word.
Advanced Memory Forensics with Volatility - CORRECT ANSWER - Volatility is one of
the most widely used memory forensics tools. Useful Volatility commands: imageinfo - vol.py or
volatility -f memdump.mem imageinfo
,Aliases - CORRECT ANSWER - PowerShell comes with several aliases set up for
common cmdlets. cat, cd, dir, ls, rm
Alternate Number Bases - CORRECT ANSWER - We are very used to counting in base
10, but other number bases like base 16 (hex) or base 2 (binary) are incredibly useful in
computing.
Alternative Search Engines - CORRECT ANSWER - No two search engines are the same.
Alternative Search Engines - Google, Bing, Yahoo, DuckDuckGo, archive.org
AlwaysInstall Elevated - CORRECT ANSWER - Some administrators will configure this
so that users can install software on their computers without administrator approval.
Analytics - CORRECT ANSWER - Collecting stats and analysing interactions on a web
server.
Anti Forensics - CORRECT ANSWER - Cyber criminals improve and modify their
operational security (OpSec) in order to avoid being caught. NotPetya is part of the Petya family
of encrypting ransomware that targets Microsoft Windows based systems.
APFS - CORRECT ANSWER - The Apple File System supports permissions and
encryption, and duplicate files can be stored without using additional space, with changes to one
copy of a file being saved as a delta (the difference between the old file and the new file) to
lower space requirements.
Application Layer - CORRECT ANSWER - An example of an application layer protocol is
something like HTTP or FTP. HTTP GET request is an application layer protocol because the
web browser will form the request necessary for displaying a page or submitting a form.
apropos - CORRECT ANSWER - The 'apropos' tool is used to search man pages for
keywords, usually to find the 'appropriate' tool to use in a particular situation. The 'apropos'
command is used to find the 'appropriate' tool for a particular job.
,apt-get - CORRECT ANSWER - The apt command is incredibly useful to rapidly find,
install, or remove software. The way 'apt' works is by having a list of 'sources'; these are servers
which contain information about available packages, download links and version information.
'apt update' only updates the list of available packages.
Arguments - CORRECT ANSWER - The 'argc' variable is an integer which contains the
number of arguments passed to the program when it was executed. The 'argv' array contains the
data passed in.
Arithmetic Logic Unit (ALU) - CORRECT ANSWER - The Arithmetic Logic Unit is the
part of the CPU responsible for performing arithmetic and logical operations.
ARP - CORRECT ANSWER - The Address Resolution Protocol translates IP addresses to
MAC addresses for transmission purposes. ARP is only for the local network.
ARP Cache - CORRECT ANSWER - ARP (address resolution protocol) is a protocol used
on local networks to map IP addresses to MAC addresses. When a computer receives an ARP
response, it saves it into the ARP cache.
ARP Spoofing / Poisoning - CORRECT ANSWER - The flaw in the ARP protocol comes
because, if an ARP response is sent to a computer, it will store that value in its ARP cache even if
it didn't make an ARP request asking for a response.
Arrays - CORRECT ANSWER - In C, you have to specify the type of the array when you
create it, and it can only ever hold that type of data. You can't mix and match within the same
array.
AS - CORRECT ANSWER - The AS keyword is used to assign an alias to a table or
field.They are used to make long SQL statements more readable, more descriptive or set the table
headings for a query to make the results more descriptive.
, ASCII - CORRECT ANSWER - American Standard Code for Information Interchange. A
table that maps binary to characters. Originally 7 bits wide for up 127 characters. Now is 8 bits
wide and up to 255 characters.
ASLR - CORRECT ANSWER - Address Space Layout Randomisation is a protection that
involves randomising the memory addresses that a program gets loaded into on each run.
Assertions - CORRECT ANSWER - The assert function will cause the program to crash
with the error message we provided if a condition is not met.
Asymmetric cryptography - CORRECT ANSWER - Asymmetric cryptography, you have
two keys, a public and a private. You can lock the message with whichever one you would like,
but you must unlock it with the opposite key.
Asymmetric Encryption - CORRECT ANSWER - Asymmetric encryption: every party
generates two encryption keys: one is private and one is public. The public encryption key is the
one you send to whoever needs to communicate with you securely. The private encryption key
should remain private only to you.
Audio Steganography - CORRECT ANSWER - Audio steganography is a technique used
to embed secret messages into digital audio. There are various methods of audio steganography,
such as LSB and Echo Hiding.
Authoritative Name Servers - CORRECT ANSWER - A name server that is authoritative
for a domain is one that controls the mapping between the domain name and the IP address. It
has the final say on where the domain points.
Authoritative nameserver - CORRECT ANSWER - The authoritative nameserver will
retrieve the specific IP address of the origin server for the provided web domain name, which the
resolver will pass back to the client.
Automatically Decoding Encoding - CORRECT ANSWER - The purpose of encoding is
to enable us to fit data that we need to store or transmit within a set of constraints that are