What is the practice of unlocking a lock by manipulating the components of the lock device without the original key?
Lock Picking
What is a computer that is portable and suitable for use while traveling?
Laptop
Decipher (kvvy) using ceaser cipher and a shift of 7
door
What is the trail of data you leave when using the internet.
Digital footprint
what is a cyber security risk that originates from within an organization?
Insider threat
Which cable is used to provide internet connection?
Ethernet cable
Decipher this
(olssv)
using ceasar cipher
hello
Which website allows people to visit archived versions of Web sites.
the wayback machine
The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
Social Engineering
Random Access memory
Decipher this binary
011101110110100101101110
win
What does OSINT stand for?
Open-source intelligence
What are the 5 levels of physical security?
Minimum.
Low-level.
Medium.
High-level.
Maximum.
Which port number does the protocol DHCP use?
67/68
Which group has posted several cryptographic challenges in order to recruit ?
Cicada 3301
How many star reviews does the university of Leeds have?
4.4 stars
Give 10 examples of physical security measures
Security guard, fences, walls, locks, CCTV, biometric scanners, Alarm systems, ID cards, good lighting
What are the seven layers of the OSI model
#1. The Physical Layer.
#2. The Data Link Layer.
#3. The Network Layer.
#4. The Transport Layer.
#5. The Session Layer.
#6. The Presentation Layer.
#7. The Application Layer.
Decipher
4C4A41486A66696C79
ECTAcyber
What is the name of the theater at Leeds university (hint: it is near the old bar and waki maki)
Riley Smith Theatre