Crypto Crazy
Forensics
Hollywood Hacking
Before and After
Grab Bag
100

Q3lwcmVzcw==

What is a Base64?

100

A database that stores configuration and records in hives, keys, and subkeys

What is the Windows Registry?

100

One of the most famous movies is about a man who leaked NSA documents before fleeing the country

What is Snowden?

100

Part of a computer responsible for calculations that help with displays and sleight-of-hand style magic

What is graphics card trick?

100

The activity that Noah always mentions and suggests people go try

What are escape rooms?

200

Pbyyrtr

What is ROT13?

200

The location on Linux where you can find syslog

What is /var/log/syslog or /var/log/messages?
200

A trio of movies about fighting back against the Machine Army. Most people don't think about the hacking and focus on taking pills

What is the Matrix series?

200

Commonly referred to as a CPU that performs calculations, and the creator of the fundamental laws of motion

What is a proces(Sir) Isaac Newton?

200

The dean of the business and CIS division

Who is Dr. Treisa Cassens?

300

Emmpv

What is Vigenere?

300

The place where one can check for persistent tasks on a Linux distribution

What are Cron Jobs or /var/spool/cron/crontabs/?

300

TV series about a cybersecurity professional who becomes a vigilante hacker at night. Rami Malek does a great portrayal of the moral dilemmas involved in hacking

What is Mr. Robot?

300

A famous co-founder of Apple and a place where you might potentially be recruited

What is a Steve Jobs Fair?

300

The card game and format that Noah likes to play

What is Commander in MTG?

400

Kiltiznh

What is Atbash?

400

The acronym MAC is used in file forensics and it stands for this

What is Modified, Accessed, and Created?

400

A Disney movie that focuses on hacking and entering a digital world with light-up motorcycles?

What is Tron?

400
A film about women working at NASA on the first rocket launch, and an Olympic sport that involves triple salchow 

What is Hidden Figure(s) Skating?

400

Hacker A sends traffic at 6Gbps. Hacker B sends traffic at 9Gbps. The Server can handle 300Gb before it crashes. If Hacker A starts 3 seconds before Hacker B, how much traffic will Hacker A send?

What is 130.8 Gb?

500

- . .- --

What is Morse Code?

500

One of the first processes to start with windows is called The System process and it has a PID of this

What is 4?

500

Not traditional hacking, but hacking concepts are used in this 2010 mind-bender. How long will that top keep spinning?

What is Inception?

500

A hacker commonly referred to as the bad type of hacker and scoring multiple goals in a row

What is a Black Hat Trick?

500

This is the phrase that Crypto Crazy made if you combined all the clues

Cypress College Cyber Programs Team

M
e
n
u