The Command Line & Scripts
Cryptography & Hashing
The CIA Triad & Control
Reconnaissance & Network Defense
Physical Security & Hardware
Recent Events & Ethics
100

This three-letter command is used in Unix to move into a different directory.

What is cd?

100

This "one-way" mathematical function turns a password into a fixed-length string of characters for secure storage.

What is a Hash?

100

This letter of the CIA triad ensures that data has not been altered or tampered with by unauthorized users.

What is Integrity?

100

This critical internet service acts as a "phonebook," translating domain names like https://www.google.com/search?q=google.com into IP addresses.

What is DNS (Domain Name System)?

100

This term refers to an attacker following an authorized person into a secure building without scanning their own badge.

What is Tailgating (or Piggybacking)?

100

This term describes a "good" hacker who uses their skills to find vulnerabilities and report them responsibly.

What is an Ethical Hacker (or White Hat)?

200

This powerful but intimidating text editor is built into almost every Unix system and requires the :wq command to save and quit.

  • What is Vi (or Vim)?

200

This type of cipher, like AES, encrypts data in fixed-size chunks rather than one bit at a time.

What is a Block Cipher?

200

Information is categorized into these three states: stored (at rest), in use (processing), and this third state.

What is Transmission (or In Transit)?

200

This term describes using advanced operators like site: or filetype: to find sensitive information via search engines.

What is Google Dorking (or Google Hacking)?

200

This is the most common motivation for "Physical Attacks" on hardware, such as stealing a laptop or a server.

What is Data Theft (or Corporate Espionage)?

200

On January 14, 2026, this major carrier suffered a massive outage that highlighted the fragility of our cellular infrastructure.

Who is Verizon?

300

This file, found in a website's root directory, tells search engine crawlers which pages they are not allowed to index.

What is robots.txt?

300

This tool is used to precalculate millions of hashes to quickly "crack" passwords by looking up the results in a table.

What is a Rainbow Table?

300

Firewalls and Encryption are examples of this type of "Control," which uses technology to protect systems.

What is a Technical Control?

300

These are the three main types of cookies: Session, Persistent, and this type, often used for cross-site tracking.

What are Third-party cookies?

300

Organizations use these programs to ensure that employees don't leave passwords on sticky notes or doors propped open.

What are Training and Awareness programs?

300

This AWS region is often cited as a "single point of failure" because so many global services rely on its data centers.

What is US-EAST-1?

400

This practice involves writing a series of Unix commands into a file to automate repetitive tasks.

What is Shell Scripting?

400

This open-source command-line tool allows users to encrypt files using algorithms like ChaCha20 or AES.

What is OpenSSL?

400

This "Factor of Authentication" includes biometrics like fingerprints or facial recognition.

What is Inherence?

400

This malicious act involves making a false report to emergency services to send a police response to a victim's address.

What is Swatting?

400

An attacker with this type of "access" can often bypass almost all digital security controls by interacting directly with the hardware.

What is Physical Access?

400

This ethical dilemma occurs when a researcher finds a bug but must decide whether to disclose it or keep it for personal gain.

What is Responsible Disclosure?

500

This specific notation (e.g., /24) is used to express a subnet mask in a more concise way than decimal dot notation.

What is CIDR notation (or Slash notation)?

500

Unlike synchronous communication, this type of messaging (like email or many IoT protocols) doesn't require both parties to be "present" at the same time.

What is Asynchronous communication?

500

This security strategy involves using multiple cloud providers to prevent a "single point of failure."

What is a Multi-cloud environment?

500

This automated tool detects threats by looking for specific patterns or "fingerprints" of known malware.

What is Signature-based detection?

500

This type of physical lock uses a series of pins of varying lengths to prevent the plug from rotating without the correct key.

What is a Pin-Tumbler lock?

500

This is the act of publicly revealing private, identifying information about someone on the internet with malicious intent.

What is Doxing?

M
e
n
u