Day 1
Day 2
Day 3
Day 4
100

This is the term for a machine/computer that does not exist physically

What is a virtual machine?

100

Wireshark and Tshark are used to carry out this process

What is traffic analysis
100

This account in Linux is also known as the superuser

What is root/the root account

100

This application is used to scan networks for information such as open ports and host information.

What is Nmap

200

You caught your coworker at your boss' desk, looking at documents they were not authorized to see.

What aspect of the CIA Triad has been violated here?

What is confidentiality

200

Alice and Bob use one secret key to encrypt their messages they send to each other. They are demonstrating this kind of encryption/cryptography

Private key

200

True/False: Passwords are harder to crack when they are shorter and have less variety of characters used

False
200

John is a penetration tester for a company. After completing his penetration test, he gives a report to the company detailing their vulnerabilities which they then use to secure their systems further. John is an example of what?

What is a white hat hacker?

300

We hid adventureland.txt inside octopus.bmp. Hiding files within other files is the definition for this.

What is steganography.

300

When data is sent across a network, it is broken into pieces called this.

What are packets?

300

Name each of these permission types and their corresponding octal value

R

W

X

Read - 4

Write - 2

eXecute - 1

M
e
n
u