1
Raspberry Pi Programming
2
Cryptography
3
Cybersecurity Fundamentals
4
Ethical Hacking
100

Python is a  ________ - based programming language.

What is text?

100

The English name of the binary number 1011

What is eleven (11)?

100

Name the intrusive software that is designed to damage and destroy computers and computer systems.

What is Malware?

100

What is the name of the website that contains information on vulnerabilities and instructions on how to exploit them? (full website address)

200

It is a flaw or glitch in a system.

What is Bug?

200

This type of cryptographic key can be posted for everyone to see, even Oscar, and still be secure enough for Ann and Bob to use.

What is a public key?

200

Name a malicious program that uses a computer network to replicate. 

What is Worm?

200

The LHOST stand for _________  ___________.

What is Local Host?

300

The set of rules that define the structure of a language.

What is Syntax?

300

The binary representation of the number twenty-one.

What is 10101?

300

Name the attackers who lacks knowledge necessary to perform attack on their own.

Who are Script Kiddies?

300

Name the tool would you use to exploit a target machine.

What is Metasploit?

400

It is a value that changes depending on the data and information the specific program receives.

What is Variable?

400

This elementary school level math problem is crucial for the security of modern cryptography on the Internet.

What is factoring a number?

400

This is  when the attacker tries every possible combination of letters, numbers, and characters to figure out a password.

 What is Brute Force Attack?

400

You will use this command to launch Metasploit on a Kali machine.

What is msfconsole?

500

The set of instructions a program will follow to do A then B and then C.

What is Algorithm?

500

Decrypt OORELH using a Vigenere cipher with keyword BAD.

What is "noodle"?

500

A type of malicious software designed to block access to a computer system until a sum of money is paid.

What is ransomware?

500

Name four ethical hacking steps.

Are these the steps of ethical hacking includes Reconnaissance, Scanning, Exploitation, and Maintaining Access?