Raspberry Pi
Programming
Cryptography
Cybersecurity Fundamentals
Ethical Hacking
Personal, Corporate & National Security
100

Two programming languages we will be using with Raspberry Pi 400.  

What is Scratch 3 and Python?

100

Another name for Caesar Cipher

What is a Shift Cipher?

100

The practice of protection of internet-connected systems such as hardware, software and data from cyberattacks.

What is Cybersecurity?

100

A virtual computer running inside a physical computer.

What is a Virtual Machine?

100

Identify three pillars of personal cybersecurity. 

What are data protection, device security & online privacy in personal cybersecurity?

200

The name of the operating system Raspberry Pi is using.

What is Linux Debian?

200

The inverse of encryption.

What is Decryption?

200

An example of analogy of cybersecurity

What is home security?

200

Name a Linux-based penetration testing platform that provides a broad array of testing tools and includes over 300 tools by default.

What does Kali Linux?

200

Identify two things you can do to improve device security related to apps. 

What is the purpose in download from legitimate sources & remove any apps you no longer use/need?

300

The writing instructions for a computer to perform desired actions.

What is Programming?

300

An average number of attempts in breaking a cipher text of an English message using Caesar Cipher.

What is 13 attempts?

300

Something of value that is stored digitally.

What is Digital Asset?

300

Name at least two command lines to obtain the IPv4 address from a Linux operating system.

What is ip a, ip address or ifconfig?

300

Identify two types of backups used.

How are Local Physical Storage and Cloud Storage used for?

400

Identify two uses of programming.

How are Mobile Apps, Video Games, Data Analytics, Websites & Software being built?

400

Name the usual technique for cracking a substitution cipher.

What is Frequency Analysis?

400

Identify three examples of devices that store digital assets.

What are mobile phones, computers, IoT devices, cars, credit/debit card and/or WiFi routers?

400

Identify two Hypervisors that you can install free of charge on your home machine for non-commercial purposes. 

What are VMware Player and Oracle VirtualBox?

400

Explain why bookmarking a site you visit often is a good security practice.

If you get an email you think is phishing and may have fake links, do not click on the links and use the bookmark links to go directly to the correct website so you know you are logging into the right site.

500

Identify two reasons why programming is important in Cybersecurity field.

How to read & interpret the code to identify the weak areas for malicious activities, writing code to improve security, and (or) enhance logical & analytical skills important in Cybersecurity field?

500

A word is encrypted using Caesar Cipher as BZIQV.  The third letter of that word is 'A'.  The decrypted word is______ using a shift of _____.

What is the encryption of TRAIN in Caesar Cipher using a shift of 8?

500

Identify three examples of Digital Assets.

What are bank account, digital wallet, social media, website logins, medical information, email, text and/or apps?

500

The malicious hacker's ultimate goal when exploiting vulnerabilities.

Whose main goal is gaining unauthorized access to computers, networks and file?

500

Explain how to improve security at home with network devices that do not receive frequent updates like Smart TVs, security cameras or gaming consoles.

Why do you place Smart TV, gaming console or security camera on a separate guest wifi network not the main wifi network used by home computers, laptops or smartphones?

M
e
n
u