The Basics
Cryptography
Programming
Cyber Threats
Potpourri
100

A flaw or bug in the system that can be exploited.

What is vulnerability?

100

A message in its encrypted form.

What is Ciphertext?

100

Data type made of whole numbers.

What is an integer?

100

Most commonly emails that leverage your emotions to extract important information from you.

What is Phishing?

100

3rd stage of digital forensics, (most difficult stage).

What is analysis?

200

Software written to harm, steal, or annoy.

What is a malware?

200

Uses different keys for encryption and decryption

What is Asymmetric cryptography?

200

Integers, floats and strings. 

What is data types? 

200

Software that binds itself to another software or computer program to harm the computer system.

What is a virus?

200

Open-source operating system, widely used in transportation, entertainment and even space.

What is Linux?

300

Convert to decimal: 010010

What is 18?

300

Digital fingerprint, used to check data for authenticity.

What is hashing (hashes)?

300

Temporary locations in memory where information is stored.

What is a variable?

300

Type of malware that holds your files hostage and encrypts them.

What is ransomware?

300

Recreation of humanity’s thought processing ability into machinery.

What is Artificial Intelligence (AI)?

400

Protects the user from malicious web traffic by controlling what comes in and out.

What is a firewall?

400

Encryption done by shifting the alphabet 3 places.

What is Caesar cipher?

400

Group of functions gathered together by a programmer or company, often imported.

What is a library?

400

The direct psychological manipulation of people to achieve goals.

What is social engineering?

400

Concept of hooking up anything with an on/off switch to a network on the Internet.

What is Internet of Things (IoT)?

500

They work by connecting digital devices together.

What is networks?

500

The art of hiding confidential information within plan sight.

What is Steganography?

500

What is the truth value: 

not(74 >= 22  and  66 < 110)

What is false?

500

Attackers forcefully using computers to guess password. 

What is brute force?

500

Percentage of cyber security breaches due to human error.

What is 95%?

M
e
n
u