Programming
This data type is a variable with a value of either True or False.
What is Boolean?
The name of the "bad actor" or "hacker" who is trying to read Alice and Bob's messages.
Who is Oscar?
A malicious program that uses a computer network to replicate.
What is Worm?
It is a virtual computer running inside a physical computer.
What is Virtual Machine?
Three pillars of personal cybersecurity
What are Data Protection, Device Security and Online Privacy?
The largest number that one byte can represent.
What is two hundred and fifty five?
Microsoft Windows 10, Apple Mac OS, Linux Debian are three examples of system software.
What is Operating System?
This cipher replaces letters with other letters in a mixed order.
What is the Substitution Cipher?
Often used as a general term that refers to a wide variety of damaging software programs.
What is Malware?
A Linux-based penetration testing platform that provides a broad array of testing tools.
What is Kali Linux?
Expand this acronym: CIA.
What is Confidentiality, Integrity, Availability?
Employees should supply this after they login to the VPN using their usernames/passwords.
What is MFA (or 2SV)?
A set of instructions which a program will follow to do: A, then B and then C.
What is Algorithm?
This is the English name of the museum we visited last Tuesday.
What is the National Cryptologic Museum?
A type of malicious software designed to block access to a computer system until a sum of money is paid.
What is Ransomware?
Three ways to obtain IPv4 address from a Linux operating system. (three command lines
What are ip a, IP address and ifconfig?
This is the percentage of all data breaches investigated were traced back to a carelessly-opened email with malicious links.
What is 93%?
A software layer installed on the physical hardware.
What is Hypervisor?
With this flow control structure, you can write a code that repeats a sequence until a certain condition is met which is also called a loop.
What is Iteration?
This word is represented in binary as 01000011 01000001 01001110 01000100 01011001.
What is CANDY?
Attackers who lacks knowledge necessary to perform attack on their own.
What are Script Kiddies?
It is a tool that used in the third step in ethical hacking
What is Metasploit?
This is an example for people who visited pro-democracy websites in Hong Kong were infected by a malware infection (three-word vocabulary)
What is an example of Watering Hole Attack?
This is the name of the organization for which the digital computer ABNER was designed in 1951.
What is NSA?
A collection of data, usually of the same data type.
What is an Array?
This is the result of decrypting IOBFBLG with the keyword CAN and the Vigenere cipher.
What is GOODBYE?
Nearby WiFi networks which impersonates a legitimate WiFi network.
What is Evil Twin?
A vulnerable application name.
What is an icecast?
Name of the United States military hacking unit.
Who is Cyber Command?
The name of the first man-portable radio encryption system that was "a heavy burden to bear".
What is KY-38 Nestor?