Algorithm for transforming plaintext to ciphertext
what is Cipher?
Given this function what would print?
def greet():
print("Hello, World!")
greet()
What is "Hello World"?
This device is a critical networking device that manages and directs internet traffic between devices within a local network and the wider internet.
What is a "router"?
The weakest link in cybersecurity structures
What is Humans?
A full-service tool for active scanning.
What is nmap?
Decrypt this message using Caesar cipher with shift of 7.
"jfiy pz mbu"
What is CYBR is fun?
What will this code print:
# Define variables
x = 10
y = 3
# Perform arithmetic operations
sum_xy = x + y
difference_xy = x - y
product_xy = x * y
# Print results
print("Sum of x and y:", sum_xy)
print("Difference of x and y:", difference_xy)
print("Product of x and y:", product_xy)
What is "
Sum of x and y: 13
Difference of x and y: 7
Product of x and y: 30"
How many bytes in IPv4 address?
What is "4 bytes"?
A form of social engineering in which an attacker lures a victim with a false promise that appeals to greed or curiosity.
What is baiting?
What are the 5 steps in the digital forensics process
Identification, Preservation, Analysis, Documentation, Presentation.
Trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained
What is Brute Force Search Example?
What was the name of Mr. Dean's dog that was stored in a dictionary in the Python 1 presentation
What is Fenix
What is the network and host part of this IP address: 192.168.1.1 when the subnet is 255.255.255.0
What is "Network part: 192.168.1 Host part 1"?
Convert these Hex Values:
8F
7A
FF
8F = 144
7A = 122
FF = 255
This open-source digital forensics platform, built on The Sleuth Kit, allows investigators to analyze disk images, recover deleted files, and examine internet history through a graphical interface?
What is Autopsy?
Using the keyword "LEMON", decrypt the following vigenere cipher text: "LXFOPVEFRNHR"
What is ATTACKATDAWN"?
What will this code print:
# Define variables
a = 10
b = 3
c = 7
# Perform mathematical operations
sum_ab = a + b
product_bc = b * c
division_ac = a / c
# Print results
print("Sum of", a, "and", b, "is:", sum_ab)
print("Product of", b, "and", c, "is:", product_bc)
print("Division of", a, "by", c, "is:", division_ac)
# Conditional statement based on results
if sum_ab > product_bc:
print("Sum of a and b is greater than product of b and c")
elif product_bc > sum_ab:
print("Product of b and c is greater than sum of a and b")
else:
print("Sum of a and b is equal to product of b and c")
What is
Sum of 10 and 3 is: 13
Product of 3 and 7 is: 21
Division of 10 by 7 is: 1.4285714285714286
Product of b and c is greater than sum of a and b
The port number is 23 what type of transport protocol is used.
What is TCP?
What letter indicated an overflow in the MCU
What is V?
List the three different type of hat hackers in context of ethical hacking.
What is white hat, black hat, and grey hat hackers?
This type of encryption uses the same key for both encryption and decryption, while its counterpart uses a public key to encrypt and a private key to decrypt. Name both types.
What are symmetric and asymmetric encryption
What will be the output for thus Python code:
def mystery_function(n):
return [x for x in range(n) if x % 2 == 0]
print(mystery_function(10))
What is [0, 2, 4, 6, 8]?
Given this IP Address 192.168.32.64/26 the subnet mask from the CIDR.
What is Subnet: 255.255.255.192
This email is an example of what type of phishing:
Good Morning Students,
Click on this link to take a 5 minute survey to receive 200 hundred dollars Amazon gift card.
What is Quid PRO QUO ATTACKS?
Information that is collected and stored as an EXIF file when a photo is taken.
What is Metadata?