Requiring both badge access and retinal scans is an example of this first principle.
What is Layering?
100
This is the part of the computer where your data is stored
What is the hard drive or memory?
100
This group exploits cyber vulnerabilities.
What are hackers?
100
This is the number of bits in a byte.
What is 8?
100
This is a secret series of letters, numbers, and symbols that you use to access something like email or a social media website.
What is a password?
200
This first principle limits what access people have to your resources and what they can do with them.
What is Least Privilege?
200
This is called RAM.
What is Random Access Memory?
200
These are simple software or hardware that records the key sequence and strokes of the keyboard into a log file on your digital device.
What are keyloggers?
200
These only do exactly what you tell them to do.
What is a computer?
200
This is a cipher form where the alphabet is shifted by a certain number
What is a caesar cipher?
300
Keeping the engineering camp in a difference bus from the cybersecurity camp is an example of this first principle.
What is Domain Separation?
300
This type of keyboard or mouse connect to your computer without wires.
What is Bluetooth?
300
This is the conversion of digital information into a format unreadable to anyone except those possessing a “key”?
What is encryption?
300
This is the basic spelling and grammar of a computer language.
What is syntax?
300
A network administrator applies this to stop or fix hacking activity.
What is a patch?
400
Robbie installed a web server, a media server, a database server, a file server, and a Minecraft server all on one computer. What principle is he not practicing?
What is Minimization?
400
This is the processor speed for your Raspberry Pi.
What is 1.2 Ghz?
400
This type of hacker attack can crack your password by simply entering different passwords over and over until it's cracked.
What is a brute force attack?
400
This is the number 17 in binary
What is 1001?
400
To crack a 5 bit Caesar cipher, how many guesses would you have to make?
What is 25?
500
Many computers are built with parts that can easily be taken out and replaced with other parts. This makes it easier to troubleshoot and fix. Which principle does this description belong to?
What is Modularity?
500
A device or substance for absorbing excessive or unwanted heat
What is a heat sink?
500
A public-private key for data encryption is an example of this function.
What is a one-way function?
500
This is a symbol that represents data that can change as the data changes.
What is a variable?
500
The modern version of this started as a communications network that could survive a nuclear explosion.