Q3lwcmVzcw==
What is a Base64?
A database that stores configuration and records in hives, keys, and subkeys
What is the Windows Registry?
One of the most famous movies is about a man who leaked NSA documents before fleeing the country
What is Snowden?
Part of a computer responsible for calculations that help with displays and sleight-of-hand style magic
What is graphics card trick?
The activity that Noah always mentions and suggests people go try
What are escape rooms?
Pbyyrtr
What is ROT13?
The location on Linux where you can find syslog
A trio of movies about fighting back against the Machine Army. Most people don't think about the hacking and focus on taking pills
What is the Matrix series?
Commonly referred to as a CPU that performs calculations, and the creator of the fundamental laws of motion
What is a proces(Sir) Isaac Newton?
The dean of the business and CIS division
Who is Dr. Treisa Cassens?
Emmpv
What is Vigenere?
The place where one can check for persistent tasks on a Linux distribution
What are Cron Jobs or /var/spool/cron/crontabs/?
TV series about a cybersecurity professional who becomes a vigilante hacker at night. Rami Malek does a great portrayal of the moral dilemmas involved in hacking
What is Mr. Robot?
A famous co-founder of Apple and a place where you might potentially be recruited
What is a Steve Jobs Fair?
The card game and format that Noah likes to play
What is Commander in MTG?
Kiltiznh
What is Atbash?
The acronym MAC is used in file forensics and it stands for this
What is Modified, Accessed, and Created?
A Disney movie that focuses on hacking and entering a digital world with light-up motorcycles?
What is Tron?
What is Hidden Figure(s) Skating?
Hacker A sends traffic at 6Gbps. Hacker B sends traffic at 9Gbps. The Server can handle 300Gb before it crashes. If Hacker A starts 3 seconds before Hacker B, how much traffic will Hacker A send?
What is 130.8 Gb?
- . .- --
What is Morse Code?
One of the first processes to start with windows is called The System process and it has a PID of this
What is 4?
Not traditional hacking, but hacking concepts are used in this 2010 mind-bender. How long will that top keep spinning?
What is Inception?
A hacker commonly referred to as the bad type of hacker and scoring multiple goals in a row
What is a Black Hat Trick?
This is the phrase that Crypto Crazy made if you combined all the clues
Cypress College Cyber Programs Team