Cryptography
Python
Networking
Social Engineering
Ethical Hacking/Computer Forensics
100

Algorithm for transforming plaintext to ciphertext

what is Cipher?

100

Given this function what would print?

def greet():

    print("Hello, World!")

greet()


What is "Hello World"?

100

This device is a critical networking device that manages and directs internet traffic between devices within a local network and the wider internet.

What is a "router"?

100

The weakest link in cybersecurity structures

What is Humans?

100

A full-service tool for active scanning.

What is nmap?

200

Decrypt this message using Caesar cipher with shift of 3.

"Sdxo lv vxv"

What is Paul is sus?

200

What will this code print:

# Define variables

x = 10

y = 3

# Perform arithmetic operations

sum_xy = x + y

difference_xy = x - y

product_xy = x * y

# Print results

print("Sum of x and y:", sum_xy)

print("Difference of x and y:", difference_xy)

print("Product of x and y:", product_xy)



What is "

Sum of x and y: 13

Difference of x and y: 7

Product of x and y: 30"


200

How many bytes in IPv4 address?

What is "4 bytes"?

200

A form of social engineering in which an attacker lures a victim with a false promise that appeals to greed or curiosity.

What is baiting?

200

What are the 5P's in attack Phases

What is Probe, Penetrate, Persist, Propagate, and Profit?

300

Trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained

What is Brute Force Search Example?

300

Write python code that will be used to unzip NSLC_Python_Cyber_File in kali linux taught during python lab

What is unzip NLSC_Python_Cyber_File?

300

What is the network and host part of this IP address: 192.168.1.1

What is "Network part: 192.168.1 Host part 1"?

300

These are the four part of Social Engineering Lifecycle

What is investigate, hook, play and exit?

300

The legal doctrine which states that bad investigations make all collected evidence inadmissible in a court of law.

What is fruit of the poisonous tree doctrine?

400

Using the keyword "LEMON", decrypt the following vigenere cipher text: "LXFOPVEFRNHR"

What is ATTACKATDAWN"?

400

What will this code print: 

# Define variables

a = 10

b = 3

c = 7


# Perform mathematical operations

sum_ab = a + b

product_bc = b * c

division_ac = a / c


# Print results

print("Sum of", a, "and", b, "is:", sum_ab)

print("Product of", b, "and", c, "is:", product_bc)

print("Division of", a, "by", c, "is:", division_ac)


# Conditional statement based on results

if sum_ab > product_bc:

    print("Sum of a and b is greater than product of b and c")

elif product_bc > sum_ab:

    print("Product of b and c is greater than sum of a and b")

else:

    print("Sum of a and b is equal to product of b and c")


What is 

Sum of 10 and 3 is: 13

Product of 3 and 7 is: 21

Division of 10 by 7 is: 1.4285714285714286

Product of b and c is greater than sum of a and b


400

The port number is 23 what type of transport protocol is used.

What is TCP?

400

This email is an example of what type of phishing: 

Good Afternoon Cora Ruiz

Congratulation on winning a lifetime supply of Diet Coke. To able to receive your prize you first need to sign up for an Coca-Cola account and sign an acknowledgement. 


What is Spear Phishing Email?

400

List the three different type of hat hackers in context of ethical hacking.

What is white hat, black hat, and grey hat hackers?

500

Given this Public key pair (3,33) the original message was encrypt to this  (17) (1) (27) (11). Now using this private key pair (7,33) decrypt the message for the original text.

What is "Hack"?

500

What will be the output for thus Python code:

def mystery_function(n):

    return [x for x in range(n) if x % 2 == 0]

print(mystery_function(10))


What is [0, 2, 4, 6, 8]?

500

Given this IP Address 192.168.32.64/26 find network address, broadcast address and range for hosts address.

What is Network address: 192.168.32.64, Broadcast address 192.168.32.127, and Host address 192.168.32.65-192.168.32.126

500

This email is an example of what type of phishing: 

Good Morning Students,

Click on this link to take a 5 minute survey to receive 200 hundred dollars Amazon gift card.

What is Quid PRO QUO ATTACKS?

500

Information that is collected and stored as an EXIF file when a photo is taken.

What is Metadata?