This m word means to have a feeling of pensive sadness, typically with no obvious cause. (This is Katelyn's favorite word)
What is melancholy?
What kind of lizard is does Katelyn have a tattoo of?
What is a Bearded Dragon?
What port is Doom?
What dog breed do the interns associate Katelyn as?
What is a Golden Retriever?
This S word is protection from, or resilience against, potential harm.
What is Security?
This G word is defined as a strange or grotesque human or animal figure that sticks out from the roof of a building (such as a church) and is used to cause rainwater to flow away from the building's sides.
What is gargoyle?
**DOUBLE POINTS**
How many blood siblings does Katelyn have?
NONE.
What port is DNS?
53
When and where was Katelyn's birthday? State, day, month and year is needed.
Colorado
August 12th, 2004
What binary number is this:
10110110
182
This F word is to understand the reason for its existence or occurrence.
What is fathom?
What is Katelyn's favorite video game?
What port is IMAP?
143
What is Katelyn's middle name?
Marissa
This is a type of malware that allows hackers to monitor and control your computer or network.
What is a RAT (Remote Access Trojan)?
This H word refers to the collective thoughts, ideas, and opinions of a group of people (such as Internet users) regarded as functioning together as a single mind?
What is hive mind?
How tall is Katelyn?
She is 5'8 because she's cool.
**DOUBLE POINTS**
What is Minecraft's port number?
25565
Who did Katelyn dress up for Halloween last year?
Who is Vector from Despicable Me?
What number is this:
01000101
69 😎
**DOUBLE POINTS**
This B word means to be in a state of bewilderment. This can mean to be confused or perplexed.
What is bumfuzzled?
Who is Katelyn's favorite musical artist?
HINT: He played many comedy-sketch characters in the early 2010's on YouTube. One character is often associated with the color pink.
Who is Joji?
What is port 3389?
What is RDP (Remote Desktop Protocol)?
**DOUBLE POINTS**
How many tattoos does Katelyn have?
5
**DOUBLE POINTS**
This cybersecurity mechanism mimics a target for hackers, and uses their intrusion attempts to gain information about cybercriminals and the way they are operating or to distract them from other targets.
What is a honeypot?