1
Programming
2
Cryptography
3
Cybersecurity Fundamentals
4
Ethical Hacking
5
Personal, Corporate & National Security
100

The program moves the sprite ________ steps and rotates _______ degrees ______ times.
(Fill in the blanks)


What is 100, 90 and 10?

100

A cipher that is sometime called the Zigzag Cipher. (vocabulary)

What is Rail Fence Cipher?

100

Type of an attack when common dictionary words are used to guess passwords. (vocabulary)

What is Dictionary Attack?

100

Name the tool that can be used to identify running services and their version on a target machine. (vocabulary)

What is Nmap?

100

The meaning of APT in cybersecurity. (three words)

What is the acronym for Advanced Persistent Threat?

200

Sprite will perform this specific action
using this running code: (how/what)


What will the code look like when the Sprite go to random positions and say hello for two seconds, three times?

200

The number of bits in 2KB. (number)

What is 16,000 (16000)?

200

List two examples of disadvantages (weaknesses) of strong password. (examples)

What examples are these?
* Long complex passwords, difficult to memorize
* Human being can only memorize limited number of items
* User must remember multiple passwords for multiple accounts
* Many businesses have strict policies that mandate passwords expire after a set of period?

200

Name the third step in ethical hacking. (word)

What is Exploitation?

200

This is an update which was corrupted with malware and was distributed to customers. (vocabulary)

What is Solarwinds Attack?



300

The set of rules that define the structure of a language. (vocabulary)

What is Syntax?

300

The decryption of the ciphertext BUFETUAIL that was generated using the Rail Fence cipher with the zigzag ... and key = 3. (a word)

What is Beautiful?

300

Type of attack when every possible combination of letters, numbers and characters are used ..... (vocabulary)

What is Brute Force Attack?

300

A strategy that interacts directly with the target. (vocabulary)

What is Active Reconnaissance?

300

This location is targeted in a watering hole attack. (location)

What is website?

400

Name two data types. (Examples)

What are String, Boolean, Numbers, Floating, Characters and Arrays?

400

The plaintext of the ciphertext RACECAR that was generated using the Rail Fence cipher with key = 7. (a word)

What is RACECAR?

400

List three things to do to develop unique passwords for each of your accounts. (examples)

What example are these?

* Use a different password for each website/service
* Use a password manager, help remember
* Long & complex password with symbols, strongest 

400

This is to refer an error to mistake in an application/software/operating system. (vocabulary)

What is Vulnerability?

400

What is the name of the Gas/Oil Pipeline company that was attacked in 2021? (name of company)

Who is Colonial?

500

Name all three different flow control structures. (List)

What are Sequential, Selection and Iteration?

500

The length of the key that encrypts San Francisco to SNAACONRICFS when the Rail Fence Cipher is used with the the zigzag... (number)

What is four (4)?

500

Define Zero Trust. (definition)

What is the network security model based on a philosophy that no person or device inside or outside of an organization’s network should be granted access to connect to IT systems or services until authenticated and continuously verified called?

500

Define Exploit Database. (definition)

What is the name of the database that contains information on vulnerabilities and instructions on how to exploit them?

500

The meaning for CISA in cybersecurity. (words)

What is the acronym for the Cybersecurity and Infrastructure Security Agency

M
e
n
u