Room Essentials
Common Cents
D-Fence! D-Fence!
Big Concerns
Give Me A Scenario
100

A utility, often installed on a browser by default, that stops unrelated ads or pages from opening while on websites.

What is a pop-up blocker?
100

Why shouldn't I use this password? henryhenry1

Don't use your name for your password. Use capital letters and special characters to increase complexity. Repeating words is easier to crack in brute force attacks.

100

This internet protocol keeps form information safe by encrypting with the Secure Sockets Layer (SSL).

What is HTTPS?

100

This describes adding permissions to users, such as moderation rights on a Twitch stream, or write permission on a file system.

What is authentication?

100

A hacker from Russia has Jenny's IP address and is trying to access her computer without her knowledge. Why can't he connect to her IP address?

Network firewall.

200

This anti-virus comes preinstalled on all Windows personal computers.

What is Windows Defender?

200

Why shouldn't I use the same password for every website?

Because if one database you use gets breached, people have your password for every website.

200

This type of attack is most commonly used to gain access to something more secure and valuable, such as a home network or a database. It involves tricking someone into believing they are in a position of authority or trust.

What is social engineering?

200

Logging events that happen on an account, such as log-in times and pages accessed, is an example of this.

What is accounting?

200

An online store has two server locations in Houston and El Paso. If Houston's internet has difficulties, the traffic for the store will be routed through El Paso until the problem is solved. What is this an example of?

Network redundancy.

300

The operating system that popular mobile OS Android is built based off, this OS is a hit with programmers and has virtually no malware.

What is Linux?

300

Why shouldn't I put my password into this website? http://domain.com

It's HTTP, so data you enter into the site is not encrypted.

300

This type of attack is why CAPTCHAs exist: it involves flooding a server with a massive amount of requests or connection attempts in order to slow it or destroy it.

What is a denial of service attack (DOS)?

300

This type of authentication requires a user to have different types of proof as to who they are, such as a password and a NFC tag.

What is multifactor authentication?

300

Sarah is scheduled for an SAT test where she has to be fingerprinted when she enters the room. Whenever she leaves and comes back, she must do it again. What type of authentication is Sarah doing for her test?

Type 3 authentication.

400

This encryption standard is what almost all data transfers are protected with on the internet today - a 256-bit algorithm that is virtually unbreakable.

What is AES (Advanced Encryption Standard)?


400

Why shouldn't I put my debit card into this website? https://www.paypal.com

Credit cards have stronger theft safeguards.

400

This ancient precursor to encryption involved shifting every letter 3 places, making messages unreadable to anyone who didn't have the key.

What is the Caesar cipher?

400

This is the method of taking measures to verify the identity of someone before performing an action - type 3 authentication is most commonly used for this.

What is non-repudiation?

400

Philip is buying a new gaming rig for home and needs to get rid of his old computer for space. What should he do before he throws away or sells his old computer?

Remove the RAM and hard drive.

500

This encryption, which can be as advanced as 384 bits, protects data sent over WiFi connections.

WPA3

(Will accept WPA2.)

500

Why shouldn't I log into my account from the airport WiFi?

Public networks are unsecured, which means any user on the network can easily intercept and decrypt traffic.

500

This type of ACL emphasizes ownership of a file - only the owner has full rights, and some of those rights can be imparted to others if the owner allows.

What is discretionary access control (DAC)?

500

This piece of equipment comes with a battery that keeps electronics running for long enough to shut down safely in the event of a power outage.

What is a UPS (Uninterruptible Power Supply)?

500

Terrence gets an unusual e-mail from his co-worker Linda - it asks him to enter his secure information into a website not normally used in his work. However, Linda has a code she uses to authenticate all of her e-mails, and she has given the genuine code. In this instance, Linda may be a victim of what?

Identity theft. (Also accepted: spear phishing)

M
e
n
u