Algorithm for transforming plaintext to ciphertext
what is Cipher?
Given this function what would print?
def greet():
print("Hello, World!")
greet()
What is "Hello World"?
This device is a critical networking device that manages and directs internet traffic between devices within a local network and the wider internet.
What is a "router"?
The weakest link in cybersecurity structures
What is Humans?
A full-service tool for active scanning.
What is nmap?
Decrypt this message using Caesar cipher with shift of 3.
"Sdxo lv vxv"
What is Paul is sus?
What will this code print:
# Define variables
x = 10
y = 3
# Perform arithmetic operations
sum_xy = x + y
difference_xy = x - y
product_xy = x * y
# Print results
print("Sum of x and y:", sum_xy)
print("Difference of x and y:", difference_xy)
print("Product of x and y:", product_xy)
What is "
Sum of x and y: 13
Difference of x and y: 7
Product of x and y: 30"
How many bytes in IPv4 address?
What is "4 bytes"?
A form of social engineering in which an attacker lures a victim with a false promise that appeals to greed or curiosity.
What is baiting?
What are the 5P's in attack Phases
What is Probe, Penetrate, Persist, Propagate, and Profit?
Trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained
What is Brute Force Search Example?
Write python code that will be used to unzip NSLC_Python_Cyber_File in kali linux taught during python lab
What is unzip NLSC_Python_Cyber_File?
What is the network and host part of this IP address: 192.168.1.1
What is "Network part: 192.168.1 Host part 1"?
These are the four part of Social Engineering Lifecycle
What is investigate, hook, play and exit?
The legal doctrine which states that bad investigations make all collected evidence inadmissible in a court of law.
What is fruit of the poisonous tree doctrine?
Using the keyword "LEMON", decrypt the following vigenere cipher text: "LXFOPVEFRNHR"
What is ATTACKATDAWN"?
What will this code print:
# Define variables
a = 10
b = 3
c = 7
# Perform mathematical operations
sum_ab = a + b
product_bc = b * c
division_ac = a / c
# Print results
print("Sum of", a, "and", b, "is:", sum_ab)
print("Product of", b, "and", c, "is:", product_bc)
print("Division of", a, "by", c, "is:", division_ac)
# Conditional statement based on results
if sum_ab > product_bc:
print("Sum of a and b is greater than product of b and c")
elif product_bc > sum_ab:
print("Product of b and c is greater than sum of a and b")
else:
print("Sum of a and b is equal to product of b and c")
What is
Sum of 10 and 3 is: 13
Product of 3 and 7 is: 21
Division of 10 by 7 is: 1.4285714285714286
Product of b and c is greater than sum of a and b
The port number is 23 what type of transport protocol is used.
What is TCP?
This email is an example of what type of phishing:
Good Afternoon Cora Ruiz
Congratulation on winning a lifetime supply of Diet Coke. To able to receive your prize you first need to sign up for an Coca-Cola account and sign an acknowledgement.
What is Spear Phishing Email?
List the three different type of hat hackers in context of ethical hacking.
What is white hat, black hat, and grey hat hackers?
Given this Public key pair (3,33) the original message was encrypt to this (17) (1) (27) (11). Now using this private key pair (7,33) decrypt the message for the original text.
What is "Hack"?
What will be the output for thus Python code:
def mystery_function(n):
return [x for x in range(n) if x % 2 == 0]
print(mystery_function(10))
What is [0, 2, 4, 6, 8]?
Given this IP Address 192.168.32.64/26 find network address, broadcast address and range for hosts address.
What is Network address: 192.168.32.64, Broadcast address 192.168.32.127, and Host address 192.168.32.65-192.168.32.126
This email is an example of what type of phishing:
Good Morning Students,
Click on this link to take a 5 minute survey to receive 200 hundred dollars Amazon gift card.
What is Quid PRO QUO ATTACKS?
Information that is collected and stored as an EXIF file when a photo is taken.
What is Metadata?