Networking
Systems
Cryptography
Web
Miscellaneous
100

The mailing address for your computer on the Internet.

What is an Internet Protocol address?

100

This is a type of memory on your computer that you can only read.

What is read only memory?

100

This basic cipher involves shifting every letter in the plaintext the same amount.

What is Caesar cipher?

100

This attack involves a Nigerian Prince sending you an email for a vast sum of money.

What is phishing?

100

The course code for the introductory undergraduate cybersecurity class at Stony Brook University.

What is CSE 331?

200

This keeps your packets safe when they go from computer to computer.

What is Transport Layer Security?

200

This is a more modern method of booting up computers that has replaced BIOS.

What is UEFI/EFI?

200

This type of math is commonly used in the field of cryptography.

What is modular arithmetic?
200

This is what impersonating a legitimate service in order to gain people's trust fraudulently is called.

What is spoofing?

200

The names of the creators of RSA.

Who are Ron Rivest, Adi Shamir, and Leonard Adleman?

300

This type of attack involves being in the middle of two entities communicating with each other.

What is a man in the middle attack?

300

This common security vulnerability involves exceeding memory capacity.

What is a buffer overflow?

300

This type of symmetric encryption is the foundation for securing almost all communication across the Internet.

What is Diffie-Hellman Secret Sharing?

300

These services are commonly used by websites to ensure that they don't get overloaded.

What is a Content Delivery Network?

300

The name of the British communications and signals intelligence agency. Bonus points if you know the full form.

What is Government Communications Headquarters (GCHQ)?

400

Disabling this caused Facebook and Facebook products to vanish off the Internet for almost 6 hours in 2021.

What is Border Gateway Protocol?

400

This type of attack gets your computer a little chilly to retrieve data from the RAM.

What is a cold boot attack?

400

The requirement for this microcontroller, which handles cryptography functions, got a lot of people in a huff when trying to install Windows 11.

What is Trusted Platform Module/TPM?

400

This attack usually involves dumping a bunch of information using cleverly placed syntax.

What is SQL injection?

400

What is Cicada 3301?

500

This was the name of a severe SSL vulnerability that caused servers to bleed out more data than they were asked for.

What is Heartbleed?
500

These devastating and nearly impossible to patch vulnerabilities were discovered in all pre-2019 x86 microprocessors.

Spectre and Meltdown

500

This sculpture, which sits at the headquarters of the Central Intelligence Agency, contains a cipher that has still not been decrypted.

What is Kryptos?

500

In 2017, this type of exploit allowed users of Valve Software's Steam client to view other people's profile info pages, and potentially access their Steam funds.

What is Cross-Site Scripting?

500

This poet was the first to use a simple substitution cipher in his work.

Who is Edgar Allan Poe?

M
e
n
u