Command Line Chaos
OS Wars
IT Meme Madness
The Cloudy Future
Cybersecurity Corner
100

In Linux, this command lists files in a directory.

ls

100

The mascot for this operating system is a penguin named Tux.

What is Linux?

100

A common IT support response, this phrase suggests restarting a device as the first troubleshooting step.

What is "Have you tried turning it off and on again?"

100

This cloud storage service from Google offers 15GB of free storage and syncs across devices.

What is Google Drive?

100

This type of cyberattack floods a network or website with excessive traffic to cause disruption.

What is a DDoS attack?

200

This command in Windows shows the network configuration, including IP address and default gateway.

Ipconfig

200

This version of Windows was widely considered a failure due to its confusing tile-based Start Menu.

What is Windows 8?

200

A popular cyber-themed meme, this hacker is often seen wearing a hoodie in a dark room, lit only by a laptop.

Who is "Hacker Man"?

200

Amazon's cloud computing service, commonly used for hosting websites and applications.

What is AWS (Amazon Web Services)?

200

A fake email designed to trick users into providing personal information is an example of this type of attack.

What is phishing?

300

This Linux command is used to change file permissions using symbolic or numeric values.

Chmod

300

The Time Machine backup feature is native to this operating system.

What is macOS?

300

This classic meme format shows a man distracted by a passing woman labeled as a tempting technology trend.

What is "Distracted Boyfriend"?

300

This Microsoft cloud platform provides solutions for virtual machines, storage, and AI.

What is Microsoft Azure?

300

This cybersecurity framework is commonly used by businesses to manage risk and includes "Identify, Protect, Detect, Respond, Recover."

What is the NIST Cybersecurity Framework?

400

In Windows, this command allows you to view active network connections, listening ports, and routing tables.

Netstat

400

This command-line based operating system, released in 1981, was the foundation for many early PCs.

What is MS-DOS?

400

This fictional character from a 1995 movie became an internet joke for saying, “I’m in” when hacking a system in seconds.

Who is "Hugh Jackman in Swordfish" or "Hackerman"?

400

The shared responsibility model in cloud security means this entity is responsible for securing the cloud infrastructure.

What is the cloud provider?

400

This term refers to malware that encrypts files and demands payment for decryption.

What is ransomware?

500

This Linux utility allows you to schedule commands to run at a specific time and date.

What is cron (or crontab for editing cron jobs)?

500

The XNU kernel is the foundation for this popular operating system.

What is macOS?

500

The phrase "It’s not a bug, it’s a feature" is commonly used to justify this type of unintended software behavior.

What is a design flaw (or unintended consequence)?

500

This type of cloud service is specifically designed for running containerized applications efficiently.

What is Kubernetes (or Container as a Service, CaaS)?

500

This cryptographic protocol is used to establish a secure connection between a web browser and a server.

What is TLS (Transport Layer Security)?

M
e
n
u