This individual spent 8 months in solitary confinement, because law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone"
Who is Kevin Mitnick
Residing on the transport layer, this protocol features reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet
What is Transmission Control Protocol (TCP)
One billion has this many zeroes.
What is nine?
Unencrypted information is said to be stored in this format
What is plaintext
The number of bytes in an IPv4 address
What is 4
This simple cipher shifts each character by a given value
What is a Caesar cipher (substitution cipher, rotation cipher)
This command displays active TCP connections, ports on which the computer is listening, does not resolve IP addresses and lists the processes that opened the connections.
What is netstat -ano
This scientist was tasked to track down a .75 cent discrepancy on a dial up phone bill and subsequently discovered the largest cyber attack against the United States. He also wrote a book about it.
Who is Cliff (Clifford) Stoll
(Cuckoo's Nest)
This protocol uses a simple connectionless communication mode, with no handshaking dialogues.
What is User Datagram Protocol (UDP)
This is equal to just under 10 trillion kilometers (or about 6 trillion miles).
What is a light year?
This attack technique involves fraudulent attempts to obtain sensitive information via email
What is Phishing
Private IPv4 addresses were set as a standard in this RFC.
What is RFC 1918
This is the effective keysize of the DES cipher
What is 56 bits (7 bytes)
This command displays environment variables in a command shell.
What is set
This individual released an XSS Worm which became the fastest spreading virus of all time, run by over 1 million users within 20 hours, carrying a payload which read “but most of all, ___ is my hero"
Who is Samy Kamkar
This protocol is used for resolution of network layer addresses into link layer addresses
What is Address Resolution Protocol (ARP)
Kilo, mega, giga, tera; this is the next consecutive unit in measuring bytes.
What is a petabyte
This slag term describes the culture of people who experimented, exposed, and compromised the telephone system
What is Phreaking
A netmask of 255.255.255.240 (or /28) has how many usable hosts?
What is 14
This cipher was used incorrectly, creating a weakness in the security of WEP
What is RC4
This is the command used to remove the hidden attribute from a file or directory. (Please provide correct switch syntax in your response)
What is attrib -h
The creator of metasploit.
Who is H.D. Moore
This network protocol was designed as a replacement for unsecured remote shell protocols
What is Secure Shell (SSH)
A human being's functional memory is estimated to be this large.
What is 1.25 Terabytes
This attack technique results in the redirection of legitimate website traffic to another fake website
What is Pharming
A technology for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet of a communication session is known as what?
What is IPSec
The two fish and three fish ciphers were invented by this crytographer
Who is Bruce Schneier
This command communicates with the service controller and installed services.
What is sc
This family social engineer said "I have been offered 3 pardons from 3 different standing Presidents and I refused them all because I do not believe that a piece of paper excuses what I did.”
Who is Frank Abagnale
This computer networking protocol provides shared access to files, printers, and serial ports, and was later renamed to CIFS.
What is Server Message Block (SMB)
This measurement unit is equal to 1000 zettabytes.
What is a Yottabyte
This packet has a protocol of 1 and a type of 8
What is ICMP (or Ping)
The subnet 224.0.0.0/4 is reserved for what use?
What is IP Multicast
This now defunct chipset, utilizing the Skipjack algorithm, was developed promoted by the NSA from 1993-1996 to allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions.
What is the "Clipper chip"
This is Microsoft's task automation framework, consisting of a command line shell and associated scripting language built on the .NET framework.
What is PowerShell
A legendary phone phreak, this individual became known as "Captain Crunch" after learning that a toy whistle packaged in boxes of Cap'n Crunch cereal emitted a tone of precisely 2600 hertz
Who is John Draper
This IPv6 protocol operates at the link layer and is responsible for address autoconfiguration of nodes.
What is Neighbor Discovery Protocol
Written in decimal form, this amount looks like this: 1,208,925,819,614,629,174,706,176 , and is equal to 1024 zebibytes
What is a Yobibyte.
This popular network attack is (ab)used by the "Circle with Disney" network device for parental control purposes
What is ARP Poisoning (or ARP Spoofing).
This Internet Protocol, written and released on April 1, 1990 in RFC 1149, transmits large amounts of data with high latency and packet loss.
What is Internet Protocol over Avian Carrier (IPoAC)
This attack occurs when
What is a collision
Which command allows for you to display all file associations from the command-line?
What is assoc