A.C.R.O.N.Y.M.S.
Commanding the Line
Malware and Security
Tech People
Hardware
100

CIA

What is Confidentiality, Integrity, and Availability?

100

This command prints the contents of a file to the terminal.

What is cat?

100

This attack, typically perpetrated using a botnet, aims to take web resources offline.

What is a DDoS attack?

100

This Silicon Valley billionaire recently acquired Twitter for USD $44bn.

Who is Elon Musk?

100

This character device allows a user to provide alphanumeric input to a computer.

What is a keyboard?

200

AAA

What is Authentication, Authorization, Accounting?

200

This command prints the current directory the user is working in to the terminal.

What is pwd?

200

This type of attack with an outdated name describes a third party intercepting traffic and modifying it for nefarious reasons.

What is a Man-in-the-Middle attack?

200

This English Countess, mathematician, and writer, commonly referred to as the first programmer, has a day named after herself in October each year.

Who is Ada Lovelace?

200

This component hold and allows communication between many of the crucial parts of a system.

What is a motherboard?

300

DHCP

What is Dynamic Host Configuration Protocol?

300

This command allow users to install Debian packages in Linux.

What is dpkg?

300

This flaw in a system can be exploited by an attacker to compromise said system.

What is a vulnerability?

300

These two Steves founded Apple Computers Inc. on April 1st 1976.

Who are Jobs and Wozniak?

BONUS: Ronald Wayne

300

This component allows a computer to connect to a network.

What is a Network Interface Card (NIC)?

400

TCP/IP

What is Transmission Control Protocol over Internet Protocol?

400

This PowerShell cmdlet prints a list of all active processes on the machine to the terminal.

What is Get-Process?

400

This piece of malicious code named after an ancient Turkish city looks legitimate, but will inflict harm to a system once installed.

What is a Trojan?

400

This person, who cracked the Enigma Machine during the Second World War, also developed a test for determining whether or not a computer is capable of human thought.

Who is Alan Turing?

400

This piece of external hardware acts as a backup for a short time in the event that power goes out.

What is an Uninterruptible Power Supply/UPS?

500

MAC (Both kinds)

What are Media Access Control, Message Authentication Code?

500

This command line utility allows users to change permissions in Windows.

What is icacls?

500

This piece of malware is self-replicating and does not require the use of files on an infected machine to do so.

What is a worm?

500

This American computer scientist and US Navy Rear Admiral had a hand in developing the first English language data processing compiler, and participated in the CODASYL consortium leading the COBOL being developed.

Who is Grace Hopper?

500

This large type of computer typically fills an entire room, and are mainly used by governments and large enterprises.

What is a Mainframe Computer?

M
e
n
u