Q1. An evil twin attack.
This is because the WAP has the same SSID as the corporate network. In an evil twin attack, the attacker tries to imitate a legit network by having the same SSID to fool devices to connect to it rather than the correct one.
Q2. SLE x ARO = ALE
Annual Loss Expectancy is the product of single loss expectancy and the annual rate of occurrence.
Q3. Signature-based
It is given that the IDS failed to detect the new threat. Signature-based IDS works by searching for a known pattern or signature of threats in its database. Since it was a new threat, this IDS was unable to report and recognize it.
Q4. -rw-rw-r-x
The chmod 665 command will grant owner and group read and write permissions, and others the read and execute permissions. Hence, final permission set: -rw-rw-r-x.
Q5. The Least Privilege Security control means giving a required user the minimum level of permissions to perform the necessary functions. For ex, if you want a person to only be able to read a file, in the Least Privilege Security control, you give that person only the required read permission and not the execute & write permissions. This is a good security practice and reduces the scope of attack as well( only required permissions are given). It also ensures that all r,w,x permissions are only given to properly verified users and not everyone.
Q6. The chmod command is used to change the permissions associated with a file. With the help of chmod command, one can provide read, write and execute permissions of a file to the three owners, groups and others.
For ex, the command
chmod 754 testexample.txt
Here, it means the owner has all three r,w,x permissions(7=4+2+1), the group has r,x permission(4+1=5), and others have only read permission.
[For reference, read=4;write=2;execute= 1;no permission=0]