Day 1
Day 2
Day 3
Day 4
Day 5
100

This is the term for a machine/computer that does not exist physically.

What is a virtual machine?

100

Wireshark and Tshark are used to carry out this process.

What is traffic analysis?

100

This account in Linux is almighty and powerful! It is also known as the superuser.

What is root/the root account?

100

This application is used to scan networks for information such as open ports and host information.

What is Nmap?

100

This is a software/hardware/or both used to prevent unauthorized programs or internet users from accessing a private network or computer.

What is a firewall?

200

You caught your coworker at your boss' desk, looking at documents they were not authorized to see.

What aspect of the CIA Triad has been violated here?

What is confidentiality?

200

Alice and Bob use one shared secret key to encrypt the messages they send to each other. They are demonstrating this kind of encryption/cryptography

What is private key?

200

True/False: Passwords are harder to crack when they are shorter and are only lowercase characters.

What is false?

200

John is a penetration tester who has been hired by a company. After completing his test, he gives his report to the company detailing their vulnerabilities which they then use to secure their systems further. John is an example of what kind of hacker?

What is a white hat hacker?

200

This is a command line firewall utility program that utilizes policy chains to allow or block traffic.

What is iptables?
300

We hid adventureland.txt inside octopus.bmp. Hiding files within other files is the definition of this.

What is steganography?

300

When data is sent across a network, it is broken into pieces called this.

What are packets?

300

Name each of these permission types

R
W
X

Read

Write

eXecute

300

This is the malware that the threat actor intends to deliver to the victim.

What is a payload?

300
Windows 7, Internal Kali, Windows Server 2008, and Ubuntu all reside behind the pfSense firewall. This network is an example of what?

What is a Local Area Network (LAN)?

M
e
n
u