Raspberry Pi
Programming
Cryptography
Cybersecurity Fundamentals
Ethical Hacking
Personal, Corporate & National Security
100

Identify two programming languages you will be using with Raspberry Pi 400.

What are Scratch 3 & Python?

100

Another name for Caesar Cipher

What is a Shift Cipher?

100

The practice of protection of internet-connected systems such as hardware, software and data from cyberattacks.

What is Cybersecurity?

100

A virtual computer running inside a physical computer.

What is a Virtual Machine?

100

Identify three pillars of personal cybersecurity. 

What types of pillars are data protection, device security, & online privacy?

200

Name the operating system Raspberry Pi is operating with.

What is Linux Debian?

200

The inverse of encryption.

What is Decryption?

200

An example of analogy of cybersecurity

What is home security?

200

Name a Linux-based penetration testing platform that provides a broad array of testing tools and includes over 300 tools by default.

What is Kali Linux?

200

Identify two things you can do to improve device security related to apps. 

What are downloading from legitimate sources & removing any apps you no longer use/need used for?

300

This is the writing instructions for a computer to perform desired actions.

What is Programming?

300

An average number of attempts in breaking a cipher text of an English message using Caesar Cipher.

What are 13 attempts?

300

Something of value that is stored digitally.

What is Digital Asset?

300

Name at least two command lines to obtain the IPv4 address from a Linux operating system.

What is ip a, ip address and/or ifconfig?

300

Identify two types of backups. 

What are Local Physical Storage and Cloud Storage?

400

Identify two uses of programming.

How are Mobile Apps, Video Games, Data Analytics, Websites & Software being built?

400

Name the usual technique for cracking a substitution cipher.

What is Frequency Analysis?

400

Identify three examples of devices that store digital assets.

What are mobile phones, computers, IoT devices, cars, credit/debit card and/or WiFi routers?

400

Identify two Hypervisors that you can install free of charge on your home machine for non-commercial purposes.

What are VMware Player and Oracle VirtualBox?

400

Explain how bookmark a site you visit often is a good security practice.

What type of good security practice is when you get an email you think is phishing and may have fake links, do not click on the links and use the bookmark links to go directly to the correct website so you know you are logging into the right site?

500

Identify two reasons why programming is important in the Cybersecurity field.

How to read & interpret  the code to detect the weak areas for malicious activities, writing code to improve security  and/or enhance logical and analytical skills important in Cybersecurity field?

500

A word is encrypted using Caesar Cipher as BZIQV.  The third letter of that word is 'A'.  The decrypted word is______ using a shift of _____.

What is the encryption of TRAIN in Caesar Cipher using a shift of 8?

500

Identify three examples of Digital Assets.

What are bank account, digital wallet, social media, website logins, medical information, email, text and/or apps?

500

Identify the malicious hacker's ultimate goal when exploiting vulnerabilities?

Whose ultimate goal is to gain unauthorized access to computers, networks, and files?

500

Identify a way of how to improve security at home with network devices that do not receive frequent updates like Smart TVs, security cameras and/or gaming consoles.

Why should you place them on a separate guest wifi network, not the main wifi network used by home computers, laptops or phones?

M
e
n
u