Programming
The program moves the sprite ________ steps and rotates _______ degrees ______ times.
(Fill in the blanks)
What is 100, 90 and 10?
A cipher that is sometime called the Zigzag Cipher. (vocabulary)
What is Rail Fence Cipher?
Type of an attack when common dictionary words are used to guess passwords. (vocabulary)
What is Dictionary Attack?
Name the tool that can be used to identify running services and their version on a target machine. (vocabulary)
What is Nmap?
The meaning of APT in cybersecurity. (three words)
What is the acronym for Advanced Persistent Threat?
Sprite will perform this specific action
using this running code: (how/what)
What will the code look like when the Sprite go to random positions and say hello for two seconds, three times?
The number of bits in 2KB. (number)
What is 16,000 (16000)?
List two examples of disadvantages (weaknesses) of strong password. (examples)
What examples are these?
* Long complex passwords, difficult to memorize
* Human being can only memorize limited number of items
* User must remember multiple passwords for multiple accounts
* Many businesses have strict policies that mandate passwords expire after a set of period?
Name the third step in ethical hacking. (word)
What is Exploitation?
This is an update which was corrupted with malware and was distributed to customers. (vocabulary)
What is Solarwinds Attack?
The set of rules that define the structure of a language. (vocabulary)
What is Syntax?
The decryption of the ciphertext BUFETUAIL that was generated using the Rail Fence cipher with the zigzag ... and key = 3. (a word)
What is Beautiful?
Type of attack when every possible combination of letters, numbers and characters are used ..... (vocabulary)
What is Brute Force Attack?
A strategy that interacts directly with the target. (vocabulary)
What is Active Reconnaissance?
This location is targeted in a watering hole attack. (location)
What is website?
Name two data types. (Examples)
What are String, Boolean, Numbers, Floating, Characters and Arrays?
The plaintext of the ciphertext RACECAR that was generated using the Rail Fence cipher with key = 7. (a word)
What is RACECAR?
List three things to do to develop unique passwords for each of your accounts. (examples)
What example are these?
* Use a different password for each website/service
* Use a password manager, help remember
* Long & complex password with symbols, strongest
This is to refer an error to mistake in an application/software/operating system. (vocabulary)
What is Vulnerability?
What is the name of the Gas/Oil Pipeline company that was attacked in 2021? (name of company)
Who is Colonial?
Name all three different flow control structures. (List)
What are Sequential, Selection and Iteration?
The length of the key that encrypts San Francisco to SNAACONRICFS when the Rail Fence Cipher is used with the the zigzag... (number)
What is four (4)?
Define Zero Trust. (definition)
What is the network security model based on a philosophy that no person or device inside or outside of an organization’s network should be granted access to connect to IT systems or services until authenticated and continuously verified called?
Define Exploit Database. (definition)
What is the name of the database that contains information on vulnerabilities and instructions on how to exploit them?
The meaning for CISA in cybersecurity. (words)
What is the acronym for the Cybersecurity and Infrastructure Security Agency?