1. Pretend you are Kevin Mitnick (the greatest social engineer) how would you use social engineering techniques to gather intelligence on a company's network? Be specific, what techniques would you use to gather what information?
2. What file permissions would the group users have on this file?
a. -rwxrw-r-- 1 Shania users 3072 Nov 3 19:05 badwords
3. Explain what this command does, include the explaination for all the switch options.
a. tar -xzvf perl-5.8.1.tar.gz
4. Describe what this device name means /dev/sdb2 ?
5. Explain in detail what this command does?
a. mount -t msdos /dev/fd1 /mnt/floppy
6. Explain what this command does?
a. date;echo The world is my oyster > NoitsNot;ls |grep N.*;date
7. What does this command do? Explain in detail including switches.
a. ps -ef
8. What does this command do?
a. echo date ; echo date >> logfile.out
9. What is a package manager? What does it do? Why would you want to use one verse just compiling a tarball?