1
Programming
2
Cryptography
3
Cybersecurity Fundamentals
4
Ethical Hacking
5
Personal, Corporate & National Security
6
Random
100

This data type is a variable with a value of either True or False. 

What is Boolean?

100

The name of the "bad actor" or "hacker" who is trying to read Alice and Bob's messages.

Who is Oscar?

100

A malicious program that uses a computer network to replicate.

What is Worm?

100

It is a virtual computer running inside a physical computer. 

What is Virtual Machine?

100

Three pillars of personal cybersecurity 

What are Data Protection, Device Security and Online Privacy?

100

The largest number that one byte can represent.

What is two hundred and fifty five?

200

Microsoft Windows 10, Apple Mac OS, Linux Debian are three examples of system software. 

What is Operating System?

200

This cipher replaces letters with other letters in a mixed order.

What is the Substitution Cipher?

200

Often used as a general term that refers to a wide variety of damaging software programs.

What is Malware?

200

A Linux-based penetration testing platform that provides a broad array of testing tools. 

What is Kali Linux?

200

Expand this acronym: CIA.

What is Confidentiality, Integrity, Availability

200

Employees should supply this after they login to the VPN using their usernames/passwords.

What is MFA (or  2SV)?

300

A set of instructions which a program will follow to do:  A, then B and then C. 

What is Algorithm?

300

This is the English name of the museum we visited last Tuesday.

What is the National Cryptologic Museum?

300

A type of malicious software designed to block access to a computer system until a sum of money is paid. 

What is Ransomware?

300

Three ways to obtain IPv4 address from a Linux operating system. (three command lines

What are ip a, IP address and ifconfig?

300

This is the percentage of all data breaches investigated were traced back to a carelessly-opened email with malicious links. 

What is 93%?

300

A software layer installed on the physical hardware. 

What is Hypervisor?

400

With this flow control structure, you can write a code that repeats a sequence until a certain condition is met which is also called a loop. 

What is Iteration?

400

This word is represented in binary as 01000011 01000001 01001110 01000100 01011001.

What is CANDY?

400

Attackers who lacks knowledge necessary to perform attack on their own. 

What are Script Kiddies?

400

It is a tool that used in the third step in ethical hacking

What is Metasploit?

400

This is an example for people who visited pro-democracy websites in Hong Kong were infected by a malware infection  (three-word vocabulary)

What is an example of Watering Hole Attack?

400

This is the name of the organization for which  the digital computer ABNER was designed in 1951.

What is NSA?

500

A collection of data, usually of the same data type.

What is an Array?

500

This is the result of decrypting IOBFBLG with the keyword CAN and the Vigenere cipher.

What is GOODBYE?

500

Nearby WiFi networks which impersonates a legitimate WiFi network.

What is Evil Twin?

500

 A vulnerable application name.

What is an icecast?

500

Name of the United States military hacking unit. 

Who is Cyber Command? 

500

The name of the first man-portable radio encryption system that was "a heavy burden to bear".

What is KY-38 Nestor?

M
e
n
u