General Meetings
Cryptography
Command Line
Cybersecurity Misc.
Random Trivia
100

We learned that this small piece of text data is sent from a website and stored in your web browser to remember things like your login state or shopping cart.

What is a Cookie?

100

This ancient substitution cipher shifts the alphabet by a certain number of spaces and was famously used by a Roman emperor.

What is the Caesar Cipher?

100

This two-letter command lists the files and directories in your current working directory.

What is ls?

100

This deceptive attack involves tricking individuals into revealing sensitive information, often via fake emails or websites.

What is Phishing?

100

Before they revolutionized the personal computer industry and started a trillion-dollar company in a local garage, these two tech pioneers walked the exact same halls we do here at Homestead High School. Name both of them.

Who are Steve Jobs and Steve Wozniak? OR Who are the two Steves?

200

We discussed how this security system acts as a barrier, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.

What is a Firewall?

200

This is the process of converting readable plaintext into an unreadable format to prevent unauthorized access.

What is Encryption?

200

Use this two-letter command to change your current directory and navigate through the file system.

What is cd?

200

This type of malicious software is designed to block access to a computer system or files until a sum of money is paid.

What is Ransomware?

200

This nostalgic aesthetic from the early 2000s—featuring low-res digicams, flip phones, and metallic colors—has seen a massive revival recently.

What is Y2K?

300

We covered how the internet communicates. The "S" in HTTPS stands for "Secure", but what does the "P" stand for in HTTP, FTP, and IP?

What is Protocol?

300

In asymmetric cryptography, you share this specific key with the world so anyone can send you encrypted messages.

What is a Public Key?

300

This command is most commonly used to print the entire contents of a text file directly to the terminal screen.

What is cat?

300

This term describes an ethical hacker who attempts to break into a system to find and patch vulnerabilities before malicious actors can exploit them.

What is a White Hat hacker?

300

In the iconic movie The Matrix, Neo is offered two pills; swallowing this color pill allows him to wake up in the real world.

What is the Red Pill?

400

In our meeting on decentralized tech, we learned that this technology functions as a distributed, public digital ledger used to record transactions across many computers. We also modeled these transactions with a whiteboard activity.

What is a Blockchain?

400

This famous electromechanical machine was used by the Germans in WWII to encrypt messages and was cracked by Alan Turing's team at Bletchley Park.

What is the Enigma machine?

400

If you need to search for a specific string of text or pattern within a file, this command is your best friend.

What is grep?

400

A DDoS attack aims to overwhelm and disrupt the normal traffic of a targeted server. DDoS stands for this.

What is a Distributed Denial of Service?

400

Before moving to its massive Redmond headquarters to build the Windows empire, this iconic tech company was actually founded in Albuquerque, New Mexico in 1975.

What is Microsoft?

500

This conceptual framework characterizes networking communication into 7 distinct layers, starting with the Physical layer at the bottom and ending with the Application layer at the top.

What is the OSI Model?

500

The security of this famous public-key cryptosystem relies entirely on the mathematical difficulty of factoring the product of two very large prime numbers.

What is RSA?

500

This command is used to change the access permissions of a file or directory, such as making a script executable.

What is chmod?

500

This classic web vulnerability allows an attacker to interfere with the queries an application makes to its database, often by inserting malicious code into entry fields.

What is SQL Injection?

500

This 19th-century mathematician, who wrote an algorithm for Charles Babbage's early mechanical computer, is widely recognized as the world's first computer programmer.

Who is Ada Lovelace?

M
e
n
u