The Basics
Cryptography
Programming
Cyber Threats
Potpourri
100

A flaw or bug in the system that can be exploited.

What is vulnerability?

100

Makes the information unreadable by a third party

What is Cryptography?

100

Function used to print output to the shell (or output screen).

What is print()?

100

Most commonly emails that leverage your emotions to extract important information from you.

What is Phishing?

100

Recreation of humanity’s thought processing ability into machinery.

What is Artificial Intelligence (AI)?

200

Software written to harm, steal, or annoy.

What is malware?

200

Digital fingerprint, used to check data for authenticity.

What is hashing (hashes)?

200

Flag used to indicate comments in lines of code.

What is a Hashtag #?

200

When a hacker blocks a person’s access to data. It can be unintentional.

What is a denial of service attack (DoS)?

200

Collection of information or data records in an organized manner

What is a Database?

300

Undiscovered or unknown vulnerability that roams in a system

What is zero-day vulnerability? 

300

The science of hiding information in plain sight.

What is Steganography?

300

Column that assigns a unique value to each row in a table.

What is a Primary key?

300

Web application attack which employs inserting malicious SQL code into a database

What is a SQL Injection

300

Computer applications used to monitor and control power plants or equipment at the supervisory level.

What is SCADA?

400

Facts, measurements, figures, numbers and just the overall information used to make decisions.

What is Data?

400

18 mod 5

What is 3?

400

Shows the route to a destination on the Internet

What is Traceroute?

400

The direct psychological manipulation of people to achieve goals.

What is social engineering?

400

Extracting files and data from disk, including previously deleted data.

What is Data Carving?

500

Ways to connect digital devices

What is Networks?

500

The information is split into same-size blocks of data that are encrypted or decrypted one block at a time

What is Block Cipher?

500

What is the truth value: 

not(74 >= 22  and  66 < 110)

What is false?

500

Cyber attack that involves an attacker exploiting a Domain Name System (DNS) server

What is Pharming?

500

To what class does the IP address 128.0.0.0 belong to?

What is class B?

M
e
n
u