Essentials of Cyber Security

Edit Answers
KHEBDKJVTFTWEQTOQQHK RMMWUPBCHMODAOGBGCMS BKSWMTYFJPUDHKHDQRIA KMYKJOJPDYCLUHQTAJBK ZJBXIOASXPHDGKUUTBGX JJUKCRLYXDPSRWCZVAGD DAKDWVSQHEXGEZCALABT SKDKVJEKAQCIPJXGJOAB VGGFIZYSTBWRVSBSHFRP WFZXAKTPREDNOIPKYHRC WEBLEVYAFCGGYXJJZSHD DOSYBRYMHPGDECSOIXJG UCWJCRQYQWEFAYTYEVEY CAHNTLULQQVMLPCKNCWW VTEJNPMGMMKDYSSWMEFQ BQPTTIFKCDCRVAKBJGXU KYFDYZHAIOCHXDOTWGVQ LVWYMJRRDEESFGUNBRHY KWCIPHERDHWJCQHVDLDK OESNSYHMVJVEQHDZZDWP
1.
Lists files and directories
2.
Changes directory
3.
Displays current working directory
4.
Displays file contents
5.
Creates a new file
6.
Creates a new directory
7.
Removes files or folders
8.
Changes file permissions
9.
Topmost directory in Linux
10.
Searches text patterns
11.
Secret value used for encryption/decryption
12.
Algorithm used for encryption
13.
Converts plaintext into ciphertext
14.
Converts ciphertext back to plaintext