Networking
Cyber Attacks
Weird Programming Languages
Search And Sort Methods
Types of OS
200

This type of network connects networks across a large geographical area such as a state or a country.

Wide Area Network

200

What is the interruption of network services to users, devices, or applications?

Denial of Service.

200

What language does this code belong to?

++++++++++[>+++++++>++++++++++>+++>+<<<<-]>++.>+.+++++++..+++.>++.
<<+++++++++++++++.>.+++.——.——–.>+.>.

Brainf*ck

200

Searching and sorting algorithms are best implemented with which data structure? (Name 1 of the 2)

An array-based list or linked list.

200

A freely available command line operating system, that provides multitasking and multi-user characteristics,.

Linux.

500

A private network that belongs to an organization and is designed to be accessible only by the organization’s members, employees, or others with authorization.

Intranet

500

What is it when attackers examine all network traffic as it passes through their NIC, independent of whether or not the traffic is addressed to them or not.

Sniffing.

500

What language does this code belong to?

HAI
CAN HAS STDIO?
I HAS A VAR
IM IN YR LOOP
  UP VAR!!1
  VISIBLE VAR
  IZ VAR BIGGER THAN 10? KTHX
IM OUTTA YR LOOP
KTHXBYE

LOLCODE

500

Which search algorithm is best for a large list (sorted)?

Binary Search.

500

A command line operating system released in November 1971, when there were only about 60 commands. Has the ability to replace expensive mainframe systems and it was developed by Bell Labs by the same people who helped to create C programming language.

UNIX

600

More expensive than twisted pair and is used to transmit voice, video, and data.  It is ideal for a medium-sized network and for cable TV.

Coaxial Cable

600

What is an impersonation attack, which takes advantage of a trusted relationship between two systems.

Spoofing.

600

What language does this code belong to?

chicken chicken chicken chicken chicken chicken chicken chicken chicken chicken chicken
chicken chicken chicken chicken chicken chicken

Chicken

600

A binary search algorithm can be best described as what type of algorithm.

A divide and conquer technique.

600

The first ever GUI operating system released in 1984 and is considered as the easiest operating system to use.

MAC OS.

800

These are radio waves that provide high-speed transmission of analog and digital signals. They are limited to line-of-sight

Microwave

800

What is called when you intercept communications between computers to steal information crossing the network?

Man in the Middle

800

What language does this code belong to?

Act I: Hamlet’s insults and flattery.
Scene I: The insulting of Romeo.

Shakespeare

800

On average, a sequential search algorithm would make how many comparisons for a list of size N.

N/2

800

A command line user interface that was developed by the Microsoft Corporation and released in August of 1981 for IBM computers.

MS-DOS (Microsoft Disk Operating system)

1000

A protocol used to request and transmit files, especially Web pages and Web page components, over the internet or other computer network.

Hyper Text Transfer Protocol

1000

What is a computer attack that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor?

Zero Day

1000

What language does this code belong to?

S S S T    S S T S S S
T  
S S S S S T T   S S T S T
T  
S S S S S T T   S T T S S
T  
S S S S S T T   S T T S S
T  
S S S S S T T   S T T T T
T  
S S S S S T S T T   S S
T  
S S S S S T S S S S S
T  

Whitespace.

1000

What is the faster sorting algorithm?

Quicksort.

1000

Most commonly used OS system for hacking.

Kali Linux.

M
e
n
u