Computer Networks
Math and Encodings
Privacy vs. Security
Red Team/Blue Team
Best and Worst Practices
100

This tool allows users to "sniff" packets and observe all messages that pass through a computer network.

What is Wireshark?

100

The hexadecimal encoding of the decimal number 13

What is 0xd?

100

This man was a whistleblower who leaked NSA confidential information about surveillance programs that violated individual privacy rights.

Who is Edward Snowden?

100

This tool allows IT/Network administrators to block certain types of network traffic that could present security issues.

What is a firewall?

100

This human behavior increases the risk of stolen credentials, potentially leaving other accounts and services of that user vulnerable.

What is password reuse?

200

When computers connect to a network, they are given this type of address

What is an IP Address?

200

Passwords are stored using this to hide the plain text

What is a hash?

200

This security feature was the focus of the FBI vs. Apple court case to gain access to a criminal's iPhone to search for incriminating messages or data.

What is a passcode?

200

These files record information about what events have happened and can be used by IT to trace history and impact of an attack

What are server logs?

200

This property is the most significant factor in making a password take an unreasonably long time to brute force.

What is password length?

300

These addresses are unique to each physical computer device - all connected devices (computers, printers, phones, servers, routers, etc.) have one of these.

What is a MAC address?

300

The result of 1011001 XOR 1101011

What is 0110010?

300

This EU regulation provides people with rights and controls for how their personal information is used, processed, and shared by websites

What is GDPR?

300

These can be stolen by hackers to hijack login sessions to impersonate other users without ever having to steal or crack passwords

What are cookies?

300

You should make sure websites are using this secure protocol before typing login credentials into the fields.

What is HTTPS?

400

This is the protocol used by the command that regularly pings another computer to check that the connection remains and measure its latency

What is ICMP?

400

The result of 313 mod 5

What is 3?

400

This type of information is regulated and required to be stored securely using encryption, and allow users to request a company delete it under the GDPR.

What is personally identifiable information?

400

Hackers might send these types of emails to Bass Pro Shops or other companies to try to trick employees into entering confidential information

What is a phishing attack?

400

These tools require physical checks before being granted access to a system

What are biometrics?

500

Network administrators might use this strategy to contain a computer virus and keep it from spreading to other connected machines.

What is network isolation?

500

This historical encryption technique has been used for millennia, but does not provide great security

What is the Caesar Cipher?

500
You must sign away your rights and click "I Agree" before continuing.

What are Terms & Conditions?

500

This career legally exploits software and computer networks to look for vulnerabilities and assess the security of systems so that we can better protect against attacks.

What is a penetration tester?

500
Websites must renew these every so often (yearly?) to verify their trusted identity and allow secure connections

What are SSL Certificates?

M
e
n
u